{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:22:57Z","timestamp":1759134177101},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T00:00:00Z","timestamp":1371081600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s10489-013-0448-2","type":"journal-article","created":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T02:41:22Z","timestamp":1371004882000},"page":"127-142","source":"Crossref","is-referenced-by-count":15,"title":["Strategies for avoiding preference profiling in agent-based e-commerce environments"],"prefix":"10.1007","volume":"40","author":[{"given":"Emilio","family":"Serrano","sequence":"first","affiliation":[]},{"given":"Jose M.","family":"Such","sequence":"additional","affiliation":[]},{"given":"Juan A.","family":"Bot\u00eda","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Garc\u00eda-Fornes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,13]]},"reference":[{"key":"448_CR1","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/WAINA.2009.168","volume-title":"International conference on Advanced Information Networking and Applications Workshops, 2009. WAINA\u201909","author":"F Abedin","year":"2009","unstructured":"Abedin F, Chao K, Godwin N, Arochena H (2009) Preference ordering in agenda based multi-issue negotiation for service level agreement. In: International conference on Advanced Information Networking and Applications Workshops, 2009. WAINA\u201909. IEEE Press, New York, pp 19\u201324"},{"key":"448_CR2","first-page":"25","volume-title":"Proceedings of IADIS international conference on e-commerce","author":"E A\u00efmeur","year":"2005","unstructured":"A\u00efmeur E, Brassard G, Onana FSM (2005) Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS international conference on e-commerce, pp 25\u201333"},{"issue":"1","key":"448_CR3","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/s10458-010-9147-0","volume":"24","author":"R Aydo\u011fan","year":"2012","unstructured":"Aydo\u011fan R, Yolum P (2012) Learning opponent\u2019s preferences for effective negotiation: an approach based on concept learning. Auton Agents Multi-Agent Syst 24(1):104\u2013140. doi: 10.1007\/s10458-010-9147-0","journal-title":"Auton Agents Multi-Agent Syst"},{"key":"448_CR4","author":"A Bahrammirzaee","year":"2013","unstructured":"Bahrammirzaee A, Chohra A, Madani K (2013) An adaptive approach for decision making tactics in automated negotiation. Appl Intell. doi: 10.1007\/s10489-013-0434-8","journal-title":"Appl Intell"},{"key":"448_CR5","volume-title":"Intelligent software agents: turning a privacy threat into a privacy protector","author":"J Borking","year":"1999","unstructured":"Borking J, Van Eck B, Siepel P, Bedrijf D (1999) Intelligent software agents: turning a privacy threat into a privacy protector. Registratiekamer, The Hague"},{"key":"448_CR6","unstructured":"Bouckaert RR, Frank E, Hall M, Kirkby R, Reutemann P, Seewald A, Scuse D (2009) Weka manual (3.7.1). http:\/\/prdownloads.sourceforge.net\/weka\/WekaManual-3-7-1.pdf?download"},{"key":"448_CR7","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1145\/1089551.1089608","volume-title":"Proceedings of the 7th International Conference on Electronic Commerce, ICEC\u201905","author":"S Buffett","year":"2005","unstructured":"Buffett S, Spencer B (2005) Learning opponents\u2019 preferences in multi-object automated negotiation. In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC\u201905. ACM, New York, pp 300\u2013305"},{"key":"448_CR8","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28:1030\u20131044","journal-title":"Commun ACM"},{"key":"448_CR9","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"CRYPTO\u201988: proceedings on advances in cryptology","author":"D Chaum","year":"1990","unstructured":"Chaum D, Fiat A, Naor M (1990) Untraceable electronic cash. In: CRYPTO\u201988: proceedings on advances in cryptology. Springer, New York, pp 319\u2013327"},{"key":"448_CR10","first-page":"84","volume-title":"DIM\u201905: proceedings of the 2005 workshop on digital identity management","author":"S Clau\u00df","year":"2005","unstructured":"Clau\u00dfS, Kesdogan D, K\u00f6lsch T (2005) Privacy enhancing identity management: protection against re-identification and profiling. In: DIM\u201905: proceedings of the 2005 workshop on digital identity management. ACM, New York, pp\u00a084\u201393"},{"key":"448_CR11","first-page":"303","volume-title":"13th USENIX security symposium","author":"R Dingledine","year":"2004","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego, CA, USA, pp 303\u2013320"},{"issue":"4","key":"448_CR12","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1007\/s10489-011-0301-4","volume":"36","author":"V Eyharabide","year":"2012","unstructured":"Eyharabide V, Amandi A (2012) Ontology-based user profile learning. Appl Intell 36(4):857\u2013869","journal-title":"Appl Intell"},{"key":"448_CR13","volume-title":"Agent technology for e-commerce","author":"M Fasli","year":"2007","unstructured":"Fasli M (2007) Agent technology for e-commerce. Wiley, New York"},{"key":"448_CR14","unstructured":"Fip A (2001) FIPA Contract Net Interaction Protocol Specification. FIPA"},{"key":"448_CR15","unstructured":"Fip A (2001) FIPA Iterated Contract Net Interaction Protocol Specification. FIPA"},{"issue":"4","key":"448_CR16","first-page":"36","volume":"10","author":"S Fischer-H\u00fcbner","year":"2008","unstructured":"Fischer-H\u00fcbner S, Hedbom H (2008) Benefits of privacy-enhancing identity management. Asia Pac Bus Rev 10(4):36\u201352","journal-title":"Asia Pac Bus Rev"},{"key":"448_CR17","volume-title":"Database nation: the death of privacy in the 21st century","author":"S Garfinkel","year":"2001","unstructured":"Garfinkel S (2001) Database nation: the death of privacy in the 21st century. O\u2019Reilly & Associates, Sebastopol"},{"issue":"3","key":"448_CR18","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1007\/s10489-012-0378-4","volume":"38","author":"J Gwak","year":"2013","unstructured":"Gwak J, Sim K (2013) A novel method for coevolving ps-optimizing negotiation strategies using improved diversity controlling edas. Appl Intell 38(3):384\u2013417","journal-title":"Appl Intell"},{"issue":"1","key":"448_CR19","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/S1363-4127(04)00014-7","volume":"9","author":"M Hansen","year":"2004","unstructured":"Hansen M, Berlich P, Camenisch J, Clau S, Pfitzmann A, Waidner M (2004) Privacy-enhancing identity management. Inf Secur Tech Rep 9(1):35\u201344","journal-title":"Inf Secur Tech Rep"},{"issue":"2","key":"448_CR20","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSP.2008.41","volume":"6","author":"M Hansen","year":"2008","unstructured":"Hansen M, Schwartz A, Cooper A (2008) Privacy and identity management. IEEE Secur Priv 6(2):38\u201345","journal-title":"IEEE Secur Priv"},{"key":"448_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4020-6914-7","volume-title":"Profiling the European citizen: cross-disciplinary perspectives","author":"M Hildebrandt","year":"2008","unstructured":"Hildebrandt M, Gutwirth S (2008) Profiling the European citizen: cross-disciplinary perspectives. Springer, Berlin"},{"key":"448_CR22","first-page":"331","volume-title":"Proceedings of the 7th international joint conference on autonomous agents and multiagent systems, AAMAS\u201908","author":"K Hindriks","year":"2008","unstructured":"Hindriks K, Tykhonov D (2008) Opponent modelling in automated multi-issue negotiation using Bayesian learning. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems, AAMAS\u201908, vol\u00a01, Richland, SC, pp 331\u2013338. International Foundation for Autonomous Agents and Multiagent Systems"},{"issue":"4","key":"448_CR23","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/299157.299175","volume":"42","author":"D Hoffman","year":"1999","unstructured":"Hoffman D, Novak T, Peralta M (1999) Building consumer trust online. Commun ACM 42(4):80\u201385","journal-title":"Commun ACM"},{"key":"448_CR24","unstructured":"JADE Board. Jade security guide (2005). http:\/\/jade.tilab.com"},{"issue":"1","key":"448_CR25","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/s10489-010-0257-9","volume":"36","author":"J-G Kang","year":"2012","unstructured":"Kang J-G, Kim S, An S-Y, Oh S-Y (2012) A new approach to simultaneous localization and map building with implicit model learning using neuro evolutionary optimization. Appl Intell 36(1):242\u2013269","journal-title":"Appl Intell"},{"issue":"2","key":"448_CR26","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/s10489-010-0263-y","volume":"36","author":"K-C Khor","year":"2012","unstructured":"Khor K-C, Ting C-Y, Phon-Amnuaisuk S (2012) A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl Intell 36(2):320\u2013329","journal-title":"Appl Intell"},{"issue":"4","key":"448_CR27","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s10489-011-0303-2","volume":"36","author":"K-J Kim","year":"2012","unstructured":"Kim K-J, Ahn H (2012) Simultaneous optimization of artificial neural networks for financial forecasting. Appl Intell 36(4):887\u2013898","journal-title":"Appl Intell"},{"key":"448_CR28","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/3-540-36086-7_16","volume-title":"Proceedings of the 4th international workshop on mobile agents for telecommunication applications, MATA\u201902","author":"L Korba","year":"2002","unstructured":"Korba L, Song R, Yee G (2002) Anonymous communications for mobile agents. In: Proceedings of the 4th international workshop on mobile agents for telecommunication applications, MATA\u201902, pp 171\u2013181"},{"key":"448_CR29","volume-title":"Proceedings of the twenty-third conference on artificial intelligence (AAAI-08)","author":"A Krause","year":"2008","unstructured":"Krause A, Horvitz E (2008) A utility-theoretic approach to privacy and personalization. In: Proceedings of the twenty-third conference on artificial intelligence (AAAI-08)"},{"key":"448_CR30","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1145\/332040.332448","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems, CHI\u201900","author":"J Lee","year":"2000","unstructured":"Lee J, Kim J, Moon JY (2000) What makes Internet users visit cyber stores again? Key design factors for customer loyalty. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI\u201900. ACM, New York, pp 305\u2013312"},{"issue":"3","key":"448_CR31","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s10489-012-0374-8","volume":"38","author":"C M\u00e1rquez-Vera","year":"2013","unstructured":"M\u00e1rquez-Vera C, Cano A, Romero C, Ventura S (2013) Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data. Appl Intell 38(3):315\u2013330","journal-title":"Appl Intell"},{"key":"448_CR32","doi-asserted-by":"crossref","first-page":"1001","DOI":"10.1145\/545056.545059","volume-title":"Proceedings of the first international joint conference on autonomous agents and multiagent systems: part\u00a03, AAMAS\u201902","author":"F Menczer","year":"2002","unstructured":"Menczer F, Street WN, Vishwakarma N, Monge AE, Jakobsson M (2002) Intellishopper: a proactive, personal, private shopping assistant. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part\u00a03, AAMAS\u201902, pp\u00a01001\u20131008"},{"key":"448_CR33","unstructured":"Newman AE (2004) Cougaar developers\u2019 guide. http:\/\/www.cougaar.org"},{"key":"448_CR34","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/948005.948051","volume-title":"Proceedings of the 5th International Conference on Electronic Commerce, ICEC\u201903","author":"A Odlyzko","year":"2003","unstructured":"Odlyzko A (2003) Privacy, economics, and price discrimination on the Internet. In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC\u201903. ACM, New York, pp 355\u2013366"},{"key":"448_CR35","volume-title":"Security, privacy and trust in modern data management (Data-centric systems and applications)","year":"2007","unstructured":"Petkovic M, Jonker W (eds) (2007) Security, privacy and trust in modern data management (Data-centric systems and applications). Springer, Berlin"},{"key":"448_CR36","unstructured":"Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34. http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml"},{"key":"448_CR37","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/1463342.1463347","volume-title":"Proceedings of the 2008 workshop on middleware security, MidSec\u201908","author":"TB Quillinan","year":"2008","unstructured":"Quillinan TB, Warnier M, Oey M, Timmer R, Brazier F (2008) Enforcing security in the agentscape middleware. In: Proceedings of the 2008 workshop on middleware security, MidSec\u201908. ACM, New York, pp 25\u201330"},{"key":"448_CR38","volume-title":"The future of identity in the information society: challenges and opportunities","year":"2009","unstructured":"Rannenberg K, Royer D, Deuker A (eds) (2009) The future of identity in the information society: challenges and opportunities. Springer, Berlin"},{"key":"448_CR39","volume-title":"Voyager security guide","author":"Recursion Software Inc.","year":"2008","unstructured":"Recursion Software Inc. (2008) Voyager security guide. http:\/\/www.recursionsw.com\/"},{"key":"448_CR40","volume-title":"ISADS","author":"V Roth","year":"2001","unstructured":"Roth V, Jalali-Sohi M (2001) Concepts and architecture of a security-centric mobile agent server. In: ISADS"},{"issue":"13\u201315","key":"448_CR41","doi-asserted-by":"crossref","first-page":"2785","DOI":"10.1016\/j.neucom.2008.10.025","volume":"72","author":"E Serrano","year":"2009","unstructured":"Serrano E, G\u00f3mez-Sanz JJ, Botia JA, Pav\u00f3n J (2009) Intelligent data analysis applied to debug complex software systems. Neurocomputing 72(13\u201315):2785\u20132795","journal-title":"Neurocomputing"},{"issue":"5","key":"448_CR42","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1016\/j.ins.2009.11.007","volume":"180","author":"E Serrano","year":"2010","unstructured":"Serrano E, Quirin A, Botia J, Cord\u00f3n O (2010) Debugging complex software systems by means of pathfinder networks. Inf Sci 180(5):561\u2013583","journal-title":"Inf Sci"},{"key":"448_CR43","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.ins.2012.04.001","volume":"205","author":"E Serrano","year":"2012","unstructured":"Serrano E, Mu\u00f1oz A, Botia J (2012) An approach to debug interactions in multi-agent system software tests. Inf Sci 205:38\u201357","journal-title":"Inf Sci"},{"key":"448_CR44","first-page":"307","volume-title":"Proceedings of the 11th international conference on autonomous agents and multiagent systems, AAMAS\u201912","author":"E Serrano","year":"2012","unstructured":"Serrano E, Rovatsos M, Botia J (2012) A qualitative reputation system for multiagent systems with protocol-based communication. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems, AAMAS\u201912, vol\u00a01, Richland, SC, pp 307\u2013314. International Foundation for Autonomous Agents and Multiagent Systems"},{"issue":"0","key":"448_CR45","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.ins.2012.12.019","volume":"230","author":"E Serrano","year":"2013","unstructured":"Serrano E, Rovatsos M, Bot\u00eda JA (2013) Data mining agent conversations: a qualitative approach to multiagent systems analysis. Inf Sci 230(0):132\u2013146","journal-title":"Inf Sci"},{"issue":"3","key":"448_CR46","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/s10489-012-0379-3","volume":"38","author":"B-E Shie","year":"2013","unstructured":"Shie B-E, Yu P, Tseng V (2013) Mining interesting user behavior patterns in mobile commerce environments. Appl Intell 38(3):418\u2013435","journal-title":"Appl Intell"},{"key":"448_CR47","series-title":"Lecture notes in computer science","first-page":"177","volume-title":"ATAL","author":"C Sierra","year":"1997","unstructured":"Sierra C, Jennings NR, Noriega P, Parsons S (1997) A framework for argumentation-based negotiation. In: Singh MP, Rao AS, Wooldridge M (eds) ATAL. Lecture notes in computer science, vol\u00a01365. Springer, Berlin, pp 177\u2013192"},{"key":"448_CR48","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith HJ, Milberg SJ (1996) Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Q 20:167\u2013196","journal-title":"MIS Q"},{"issue":"3","key":"448_CR49","doi-asserted-by":"crossref","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D Solove","year":"2006","unstructured":"Solove D (2006) A taxonomy of privacy. Univ PA Law Rev 154(3):477","journal-title":"Univ PA Law Rev"},{"key":"448_CR50","volume-title":"International Conference for Human-Computer Interaction (CHI\u20192006), workshop on privacy and personalization","author":"S Spiekermann","year":"2006","unstructured":"Spiekermann S (2006) Individual price discrimination\u2014an impossibility? In: International Conference for Human-Computer Interaction (CHI\u20192006), workshop on privacy and personalization"},{"issue":"1","key":"448_CR51","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S Spiekermann","year":"2009","unstructured":"Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67\u201382","journal-title":"IEEE Trans Softw Eng"},{"key":"448_CR52","unstructured":"Such JM (2011) Enhancing Privacy in Multi-agent Systems. PhD thesis, Departament de Sistemes Inform\u00e0tics i Computaci\u00f3, Universitat Polit\u00e8cnica de Val\u00e8ncia"},{"issue":"11","key":"448_CR53","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1002\/spe.1042","volume":"41","author":"JM Such","year":"2011","unstructured":"Such JM, Alberola JM, Espinosa A, Garc\u00eda-Fornes A (2011) A Group-oriented Secure Multiagent Platform. Softw Pract Exp 41(11):1289\u20131302","journal-title":"Softw Pract Exp"},{"issue":"7","key":"448_CR54","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1016\/j.engappai.2011.06.008","volume":"24","author":"JM Such","year":"2011","unstructured":"Such JM, Espinosa A, Garc\u00eda-Fornes A, Botti V (2011) Partial identities as a foundation for trust and reputation. Eng Appl Artif Intell 24(7):1128\u20131136","journal-title":"Eng Appl Artif Intell"},{"key":"448_CR55","author":"JM Such","year":"2013","unstructured":"Such JM, Espinosa A, Garc\u00eda-Fornes A (2013) A Survey of Privacy in Multi-agent Systems. Knowl Eng Rev. doi: 10.1017\/S0269888913000180","journal-title":"Knowl Eng Rev"},{"issue":"1","key":"448_CR56","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.engappai.2012.06.009","volume":"26","author":"JM Such","year":"2013","unstructured":"Such JM, Garc\u00eda-Fornes A, Espinosa A, Bellver J (2013) Magentix2: a privacy-enhancing agent platform. Eng Appl Artif Intell 26(1):96\u2013109","journal-title":"Eng Appl Artif Intell"},{"key":"448_CR57","unstructured":"TRUSTe and TNS (2009) 2009 study: Consumer attitudes about behavioral targeting"},{"key":"448_CR58","doi-asserted-by":"crossref","unstructured":"Turow J, King J, Hoofnagle C, Bleakley A, Hennessy M (2009) Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214","DOI":"10.2139\/ssrn.1478214"},{"key":"448_CR59","volume-title":"Proceedings of second international workshop on safety and security in multiagent systems","author":"S Ugurlu","year":"2005","unstructured":"Ugurlu S, Erdogan N (2005) An overview of secmap secure mobile agent platform. In: Proceedings of second international workshop on safety and security in multiagent systems"},{"key":"448_CR60","volume-title":"Handbook of privacy and privacy-enhancing technologies: the case of intelligent software agents","author":"G Blarkom van","year":"2003","unstructured":"van Blarkom G, Borking J, Olk J (eds) (2003) Handbook of privacy and privacy-enhancing technologies: the case of intelligent software agents. College bescherming persoonsgegevens, The Hague"},{"issue":"2","key":"448_CR61","doi-asserted-by":"crossref","first-page":"219","DOI":"10.3233\/WIA-2010-0188","volume":"8","author":"M Warnier","year":"2010","unstructured":"Warnier M, Brazier F (2010) Anonymity services for multi-agent systems. Web Intell Agent Syst 8(2):219\u2013232","journal-title":"Web Intell Agent Syst"},{"issue":"2","key":"448_CR62","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1111\/1540-4560.00072","volume":"59","author":"A Westin","year":"2003","unstructured":"Westin A (2003) Social and political dimensions of privacy. J Soc Issues 59(2):431\u2013453","journal-title":"J Soc Issues"},{"key":"448_CR63","unstructured":"Wine (2009). http:\/\/www.w3.org\/TR\/2004\/REC-owl-guide-20040210\/wine.rdf"},{"key":"448_CR64","volume-title":"Data mining: practical machine learning tools and techniques with Java implementations (The Morgan Kaufmann series in data management systems)","author":"IH Witten","year":"1999","unstructured":"Witten IH, Frank E (1999) Data mining: practical machine learning tools and techniques with Java implementations (The Morgan Kaufmann series in data management systems), 1st edn. Morgan Kaufmann, San Mateo","edition":"1"},{"key":"448_CR65","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1023\/A:1025859021913","volume":"10","author":"H Xu","year":"2003","unstructured":"Xu H, Shatz SM (2003) Adk: an agent development kit based on a formal design model for multi-agent systems. Autom Softw Eng 10:337\u2013365","journal-title":"Autom Softw Eng"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-013-0448-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-013-0448-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-013-0448-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T06:56:40Z","timestamp":1595919400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-013-0448-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,13]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["448"],"URL":"https:\/\/doi.org\/10.1007\/s10489-013-0448-2","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,13]]}}}