{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T03:37:36Z","timestamp":1768966656419,"version":"3.49.0"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2008,6,30]],"date-time":"2008-06-30T00:00:00Z","timestamp":1214784000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1007\/s11036-008-0087-8","type":"journal-article","created":{"date-parts":[[2008,6,29]],"date-time":"2008-06-29T17:49:18Z","timestamp":1214761758000},"page":"431-441","source":"Crossref","is-referenced-by-count":13,"title":["Bio-Inspired Algorithms for Dynamic Resource Allocation in Cognitive Wireless Networks"],"prefix":"10.1007","volume":"13","author":[{"given":"T.","family":"Renk","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C.","family":"Kloeck","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D.","family":"Burgkhardt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"F. K.","family":"Jondral","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D.","family":"Grandblaise","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Gault","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.-C.","family":"Dunat","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2008,6,30]]},"reference":[{"key":"87_CR1","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/35.852032","volume":"38","author":"S Verdu","year":"2000","unstructured":"Verdu S (2000) Wireless bandwidth in the making. IEEE Commun Mag 38:53\u201358","journal-title":"IEEE Commun Mag"},{"key":"87_CR2","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/35.894384","volume":"39","author":"Q Bi","year":"2001","unstructured":"Bi Q, Zysman GI, Menkes H (2001) Wireless mobile communications at the start of the 21st century. IEEE Commun Mag 39:110\u2013116","journal-title":"IEEE Commun Mag"},{"key":"87_CR3","doi-asserted-by":"crossref","unstructured":"Roth M, Wicker S (2003) Termite: ad-hoc networking with stigmergy. In: IEEE global telecommunications conference (GLOBECOM 03), San Francisco, 1\u20135 December 2003","DOI":"10.1109\/GLOCOM.2003.1258772"},{"key":"87_CR4","unstructured":"Roth M, Wicker S (2003) Termite: emergent ad-hoc networking. In: The second mediterranean workshop on ad-hoc networks, Medhia, 25\u201327 June 2003"},{"key":"87_CR5","doi-asserted-by":"crossref","unstructured":"Renk T, Kloeck C, Jondral FK (2007) A cognitive approach to the detection of spectrum holes in wireless networks. In: IEEE consumer communications and networking conference (CCNC 07), Las Vegas, 11\u201313 January 2007","DOI":"10.1109\/CCNC.2007.225"},{"key":"87_CR6","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1109\/TEVC.2005.857074","volume":"10","author":"T Blackwell","year":"2006","unstructured":"Blackwell T, Branke J (2006) Multi-swarms, exclusion, and anti-convergence in dynamic environments. IEEE Trans Evol Comput 10:459\u2013472","journal-title":"IEEE Trans Evol Comput"},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Cicirello V, Smith S (2002) Distributed coordination resources via wasp-like agents. In: Workshop on Radical Agent Concepts","DOI":"10.1007\/978-3-540-45173-0_5"},{"key":"87_CR8","first-page":"68","volume":"1","author":"J-C Dunat","year":"2006","unstructured":"Dunat J-C, Grandblaise D, Bonnet C (2006) Collaborative allocation of orthogonal frequency division multiplex sub carriers using swarm intelligence. J Commun 1:68\u201376","journal-title":"J Commun"},{"key":"87_CR9","doi-asserted-by":"crossref","unstructured":"Kloeck C, Jaekel H, Jondral FK (2005) Dynamic and local combined pricing, allocation and billing system with cognitive radios. In: IEEE symposium on new frontiers in dynamic spectrum access networks (DySPAN 05), Baltimore, 8\u201311 November 2005","DOI":"10.1109\/DYSPAN.2005.1542619"},{"key":"87_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0911-0","volume-title":"Evolutionary optimization in dynamic environments","author":"J Branke","year":"2002","unstructured":"Branke J (2002) Evolutionary optimization in dynamic environments. Kluwer Academic, Boston"},{"key":"87_CR11","volume-title":"Swarm intelligence. ISBN 1-55860-595-9","author":"J Kennedy","year":"2001","unstructured":"Kennedy J, Eberhart RC, Shi Y (2001) Swarm intelligence. ISBN 1-55860-595-9. Morgan Kaufmann, San Francisco"},{"key":"87_CR12","volume-title":"Adaptation in natural and artificial systems. ISBN 0-472-08460-7","author":"JH Holland","year":"1975","unstructured":"Holland JH (1975) Adaptation in natural and artificial systems. ISBN 0-472-08460-7. University of Michigan Press, Ann Arbor"},{"key":"87_CR13","volume-title":"Evolutionsstrategie \u201994. ISBN 3-7728-1642-8","author":"I Rechenberg","year":"1994","unstructured":"Rechenberg I (1994) Evolutionsstrategie \u201994. ISBN 3-7728-1642-8. Frommann-Holzboog, Stuttgart"},{"key":"87_CR14","volume-title":"Evolutionsstrategie \u201994. ISBN 0-19-857519-X","author":"R Dawkins","year":"1977","unstructured":"Dawkins R (1977) Evolutionsstrategie \u201994. ISBN 0-19-857519-X. Oxford University Press, Oxford"},{"key":"87_CR15","volume-title":"Price formation in double auctions. Lecture notes in computer science","author":"S Gjerstad","year":"2001","unstructured":"Gjerstad S, Dickhaut J (2001) Price formation in double auctions. Lecture notes in computer science. Springer, Heidelberg"},{"key":"87_CR16","volume-title":"Price formation in double auctions. ISBN 0-691-08175-1, 0-691-10042-X","author":"G Shafer","year":"1976","unstructured":"Shafer G (1976) Price formation in double auctions. ISBN 0-691-08175-1, 0-691-10042-X. Princeton University Press, Princeton"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-008-0087-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-008-0087-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-008-0087-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:16:01Z","timestamp":1559358961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-008-0087-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,30]]},"references-count":16,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["87"],"URL":"https:\/\/doi.org\/10.1007\/s11036-008-0087-8","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,6,30]]}}}