{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T20:59:27Z","timestamp":1648673967238},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2010,8,27]],"date-time":"2010-08-27T00:00:00Z","timestamp":1282867200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Swarm Intell"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s11721-010-0044-6","type":"journal-article","created":{"date-parts":[[2010,8,26]],"date-time":"2010-08-26T19:03:38Z","timestamp":1282849418000},"page":"275-300","source":"Crossref","is-referenced-by-count":1,"title":["Words, antibodies and their interactions"],"prefix":"10.1007","volume":"4","author":[{"given":"Nikolaos","family":"Nanas","sequence":"first","affiliation":[]},{"given":"Manolis","family":"Vavalis","sequence":"additional","affiliation":[]},{"given":"Anne","family":"De Roeck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,27]]},"reference":[{"key":"44_CR1","first-page":"107","volume-title":"ICARIS 2002: 1st international conference on artificial immune systems","author":"H. Bersini","year":"2002","unstructured":"Bersini, H. (2002). Self-assertion versus self-recognition: A tribute to Francisco Varela. In J. Timmis & P.\u00a0J.\u00a0Bentley (Eds.), ICARIS 2002: 1st international conference on artificial immune systems (pp.\u00a0107\u2013112). Canterbury: University of Kent at Canterbury Printing Unit."},{"key":"44_CR2","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/11823940_34","volume-title":"Artificial immune systems, 5th international conference (ICARIS 2006)","author":"G. B. Bezerra","year":"2006","unstructured":"Bezerra, G. B., Barra, T. V., Ferreira, H. M., Knidel, H., de\u00a0Castro, L. N., & Zuben, F. J. V. (2006). An immunological filter for spam. In H. Bersini & J. Carneiro (Eds.), Lecture notes in computer science : Vol. 4163. Artificial immune systems, 5th international conference (ICARIS 2006) (pp. 446\u2013458). Heidelberg: Springer."},{"key":"44_CR3","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195131581.001.0001","volume-title":"Swarm intelligence: from natural to artificial systems","author":"E. Bonabeau","year":"1999","unstructured":"Bonabeau, E., Dorigo, M., & Theraulaz, G. (1999). Swarm intelligence: from natural to artificial systems. New York: Oxford University Press, Santa Fe Institute Studies in the Sciences of Complexity."},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Cayzer, S., & Aickelin, U. (2002). A recommender system based on the immune network. Tech. Rep. HPL-2002-1, HP Laboratories Bristol, UK.","DOI":"10.1109\/CEC.2002.1007029"},{"issue":"1","key":"44_CR5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/j.1365-3083.1995.tb03619.x","volume":"42","author":"A. Coutinho","year":"1995","unstructured":"Coutinho, A. (1995). The network theory: 21 years later (editorial). Scandinavian Journal of Immunology, 42(1), 3\u20138.","journal-title":"Scandinavian Journal of Immunology"},{"key":"44_CR6","first-page":"254","volume":"39","author":"R. J. Boer De","year":"1991","unstructured":"De\u00a0Boer, R. J. (1991). Recent developments in idiotypic network theory. Netherlands Journal of Medicine, 39, 254\u2013262.","journal-title":"Netherlands Journal of Medicine"},{"key":"44_CR7","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/S0022-5193(05)80313-3","volume":"149","author":"R. J. Boer De","year":"1991","unstructured":"De Boer, R. J., & Perelson, A. S. (1991). Size and connectivity as emergent properties of a developing immune network. Journal of Theoretical Biology, 149, 381\u2013424.","journal-title":"Journal of Theoretical Biology"},{"key":"44_CR8","volume-title":"Artificial immune systems: a new computational intelligence approach","author":"L. N. Castro de","year":"2002","unstructured":"de Castro, L. N., & Timmis, J. (2002). Artificial immune systems: a new computational intelligence approach. Heidelberg: Springer."},{"key":"44_CR9","first-page":"231","volume-title":"Data mining: a heuristic approach","author":"L. N. Castro de","year":"2001","unstructured":"de Castro, L. N., & Zuben, F. J. V. (2001). aiNet: An artificial immune network for data analysis. In H.\u00a0A.\u00a0Abbass, R. A. Sarker, & C. S. Newton (Eds.), Data mining: a heuristic approach (pp. 231\u2013259). Hershey: Idea Group Publishing."},{"issue":"9","key":"44_CR10","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.4249\/scholarpedia.1462","volume":"2","author":"M. Dorigo","year":"2007","unstructured":"Dorigo, M., & Birattari, M. (2007). Swarm intelligence. Scholarpedia, 2(9), 1462. http:\/\/www.scholarpedia.org\/article\/Swarm_intelligence .","journal-title":"Scholarpedia"},{"key":"44_CR11","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/0167-2789(86)90240-X","volume":"22","author":"J. D. Farmer","year":"1986","unstructured":"Farmer, J. D., Packard, N. H., & Perelson, A. S. (1986). The immune system, adaptation, and machine learning. Physica D, 22, 187\u2013204.","journal-title":"Physica D"},{"key":"44_CR12","volume-title":"Encyclopedia of life sciences","author":"T. Fehr","year":"2001","unstructured":"Fehr, T., & Caspar, C. B. (2001). Idiotype network. In Encyclopedia of life sciences. New York: Wiley."},{"key":"44_CR13","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-540-45192-1_21","volume-title":"Artificial immune systems, second international conference (ICARIS 2003)","author":"S. M. Garrett","year":"2003","unstructured":"Garrett, S. M. (2003). A paratope is not and epitope: Implications for immune network models and clonal selection. In J. Timmis, P. Bentley, & E. Hart (Eds.), Lecture notes in computer science : Vol. 2787. Artificial immune systems, second international conference (ICARIS 2003) (pp. 217\u2013228). Heidelberg: Springer."},{"key":"44_CR14","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/11823940_9","volume-title":"Artificial immune systems, 5th international conference (ICARIS 2006)","author":"E. Hart","year":"2006","unstructured":"Hart, E., Bersini, H., & Santos, F. (2006). Tolerance vs intolerance: How affinity defines topology in an idiotypic network. In H. Bersini & J. Carneiro (Eds.), Lecture notes in computer science : Vol. 4163. Artificial immune systems, 5th international conference (ICARIS 2006) (pp. 109\u2013121). Heidelberg: Springer."},{"key":"44_CR15","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/978-3-540-73922-7_22","volume-title":"Artificial immune systems, 6th international conference (ICARIS 2007)","author":"E. Hart","year":"2007","unstructured":"Hart, E., Santos, F., & Bersini, H. (2007). Topological constraints in the evolution of idiotypic networks. In L.\u00a0N.\u00a0de\u00a0Castro, F. J. V. Zuben, & H. Knidel (Eds.), Lecture notes in computer science : Vol. 4628. Artificial immune systems, 6th international conference (ICARIS 2007) (pp. 252\u2013263). Heidelberg: Springer."},{"key":"44_CR16","first-page":"377","volume-title":"Mathematical modelling & computing in biology and medicine, The MIRIAM project series, Progetto Leonardo","author":"U. Hershberg","year":"2003","unstructured":"Hershberg, U., Solomon, S., & Cohen, I. R. (2003). What is the basis of the immune system\u2019s specificity? In V. Capasso (Ed.), Mathematical modelling & computing in biology and medicine, The MIRIAM project series, Progetto Leonardo (pp. 377\u2013384). Bologna: ESCULAPIO Pub. Co."},{"key":"44_CR17","first-page":"373","volume":"125(C)","author":"N. K. Jerne","year":"1973","unstructured":"Jerne, N. K. (1973). Towards a network theory of the immune system. Annals of Immunology, 125(C), 373\u2013389.","journal-title":"Annals of Immunology"},{"key":"44_CR18","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1145\/1141277.1141533","volume-title":"SAC \u201906: proceedings of the 2006 ACM symposium on applied computing","author":"R. Kassab","year":"2006","unstructured":"Kassab, R., & Lamirel, J. C. (2006). An innovative approach to intelligent information filtering. In SAC \u201906: proceedings of the 2006 ACM symposium on applied computing (pp. 1089\u20131093). New York: ACM Press."},{"key":"44_CR19","series-title":"Boston studies in the philosophy of science","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-009-8947-4","volume-title":"Autopoiesis and cognition: the realization of the living","author":"H. R. Maturana","year":"1980","unstructured":"Maturana, H. R., & Varela, F. J. (1980). Boston studies in the philosophy of science : Vol. 42. Autopoiesis and cognition: the realization of the living. Dordrecht: Reidel."},{"key":"44_CR20","unstructured":"McElligott, M., & Sorensen, H. (1994). An evolutionary connectionist approach to personal information filtering. In 4th Irish neural networks conference \u201994 (pp. 141\u2013146)."},{"issue":"2","key":"44_CR21","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/s10852-009-9104-6","volume":"8","author":"C. McEwan","year":"2009","unstructured":"McEwan, C., & Hart, E. (2009). Representation in the (artificial) immune system. Journal of Mathematical Modelling and Algorithms, 8(2), 125\u2013149.","journal-title":"Journal of Mathematical Modelling and Algorithms"},{"key":"44_CR22","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1109\/FOCI.2007.371502","volume-title":"IEEE symposium on foundations of computational intelligence (FOCI 2007)","author":"M. Mendao","year":"2007","unstructured":"Mendao, M., Timmis, J., Andrews, P. S., & Davies, M. (2007). The immune system in pieces: Computational lessons from degeneracy in the immune system. In IEEE symposium on foundations of computational intelligence (FOCI 2007) (pp. 394\u2013400). Piscataway: IEEE Press."},{"key":"44_CR23","first-page":"161","volume-title":"ICARIS 2002: 1st international conference on artificial immune systems","author":"T. Morrison","year":"2002","unstructured":"Morrison, T., & Aickelin, U. (2002). An artificial immune system as a recommender for web sites. In ICARIS 2002: 1st international conference on artificial immune systems (pp. 161\u2013169). Canterbury: University of Kent at Canterbury Printing Unit."},{"key":"44_CR24","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-540-73922-7_2","volume-title":"Artificial immune systems, 6th international conference (ICARIS 2007)","author":"N. Nanas","year":"2007","unstructured":"Nanas, N., & De\u00a0Roeck, A. (2007). Multimodal dynamic optimisation: from evolutionary algorithms to artificial immune systems. In Lecture notes in computer science : Vol. 4628. Artificial immune systems, 6th international conference (ICARIS 2007) (pp. 13\u201324). Heidelberg: Springer."},{"issue":"2","key":"44_CR25","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s11047-008-9068-x","volume":"8","author":"N. Nanas","year":"2009","unstructured":"Nanas, N., & De\u00a0Roeck, A. (2009a). Autopoiesis the immune system and adaptive information filtering. Natural Computing, 8(2), 387\u2013427.","journal-title":"Natural Computing"},{"key":"44_CR26","unstructured":"Nanas, N., & De\u00a0Roeck, A. (2009b). A review of evolutionary and immune inspired information filtering. Natural Computing. http:\/\/www.springerlink.com\/content\/g523m8328856gpn4\/ (online first)."},{"key":"44_CR27","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1007\/978-3-540-87881-0_17","volume-title":"Artificial intelligence: theories, models and applications, 5th Hellenic conference on AI (SETN 2008)","author":"N. Nanas","year":"2008","unstructured":"Nanas, N., & Vavalis, M. (2008). A \u201cbag\u201d or a \u201cwindow\u201d of words for information filtering. In J. Darzentas, G. A. Vouros, S. Vosinakis, & A. Arnellos (Eds.), Lecture notes in computer science : Vol. 5138. Artificial intelligence: theories, models and applications, 5th Hellenic conference on AI (SETN 2008) (pp. 182\u2013193). Heidelberg: Springer."},{"key":"44_CR28","first-page":"198","volume-title":"26th annual international ACM SIGIR conference on research and development in information retrieval","author":"N. Nanas","year":"2003","unstructured":"Nanas, N., Uren, V., De\u00a0Roeck, A., & Domingue, J. (2003). Building and applying a concept hierarchy representation of a user profile. In 26th annual international ACM SIGIR conference on research and development in information retrieval (pp. 198\u2013204). New York: ACM Press."},{"key":"44_CR29","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-540-30220-9_12","volume-title":"Artificial immune systems, third international conference (ICARIS 2004)","author":"N. Nanas","year":"2004","unstructured":"Nanas, N., Uren, V., & De\u00a0Roeck, A. (2004a). Nootropia: a user profiling model based on a self-organising term network. In G. Nicosia, V. Cutello, P. J. Bentley, & J. Timmis (Eds.), Lecture notes in computer science : Vol. 3239. Artificial immune systems, third international conference (ICARIS 2004) (pp. 146\u2013160). Heidelberg: Springer."},{"key":"44_CR30","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-24674-9_42","volume-title":"Methods and applications of artificial intelligence, third Hellenic conference on AI (SETN 2004)","author":"N. Nanas","year":"2004","unstructured":"Nanas, N., Uren, V., De\u00a0Roeck, A., & Domingue, J. (2004b). Multi-topic information filtering with a single user profile. In Lecture notes in computer science : Vol. 3025. Methods and applications of artificial intelligence, third Hellenic conference on AI (SETN 2004) (pp. 400\u2013409). Heidelberg: Springer."},{"key":"44_CR31","first-page":"13","volume-title":"4th international workshop on natural language and information systems (NLIS \u201904)","author":"N. Nanas","year":"2004","unstructured":"Nanas, N., Uren, V., & Roeck, A. D. (2004c). A comparative evaluation of term weighting methods in information filtering. In 4th international workshop on natural language and information systems (NLIS \u201904) (pp. 13\u201317). Washington: IEEE Computer Society Press."},{"key":"44_CR32","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/978-3-642-04417-5_23","volume-title":"Advances in information retrieval theory, second international conference on the theory of information retrieval (ICTIR 2009)","author":"N. Nanas","year":"2009","unstructured":"Nanas, N., Vavalis, M., & De\u00a0Roeck, A. (2009a). What happened to content based information filtering? In L. Azzopadi, G. Kazai, S. Robertson, S. Ruger, M. Shokouhi, D. Song, & E. Yilmaz (Eds.), Lecture notes in computer science : Vol. 5766. Advances in information retrieval theory, second international conference on the theory of information retrieval (ICTIR 2009) (pp. 249\u2013256). Heidelberg: Springer."},{"key":"44_CR33","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-642-03246-2_20","volume-title":"Artificial immune systems, 8th international conference (ICARIS 2009)","author":"N. Nanas","year":"2009","unstructured":"Nanas, N., Vavalis, M., & Kellis, L. (2009b). Immune learning in a dynamic information environment. In Lecture notes in computer science : Vol. 5666. Artificial immune systems, 8th international conference (ICARIS 2009) (pp. 192\u2013205). Heidelberg: Springer."},{"key":"44_CR34","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1016\/j.ipm.2009.07.005","volume":"46","author":"N. Nanas","year":"2010","unstructured":"Nanas, N., Vavalis, M., & Houstis, E. (2010). Personalised news and scientific literature aggregation. Information Processing and Management, 46, 268\u2013283.","journal-title":"Information Processing and Management"},{"key":"44_CR35","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-540-45192-1_17","volume-title":"Artificial immune systems, second international conference (ICARIS 2003)","author":"M. Neal","year":"2003","unstructured":"Neal, M. (2003). Meta-stable memory in an artificial immune network. In J. Timmis, P. J. Bentley, & E. Hart (Eds.), Lecture notes in computer science : Vol. 2787. Artificial immune systems, second international conference (ICARIS 2003) (pp. 168\u2013180). Heidelberg: Springer."},{"key":"44_CR36","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1007\/11536444_21","volume-title":"Artificial immune systems, 4th international conference (ICARIS 2005)","author":"T. Oda","year":"2005","unstructured":"Oda, T., & White, T. (2005). Immunity from spam: An analysis of an artificial immune system for junk email detection. In Lecture notes in computer science : Vol. 3627. Artificial immune systems, 4th international conference (ICARIS 2005) (pp. 276\u2013289). Heidelberg: Springer."},{"key":"44_CR37","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/0022-5193(79)90275-3","volume":"81","author":"A. Perelson","year":"1979","unstructured":"Perelson, A., & Oster, G. (1979). Theoretical studies of clonal selection: Minimal antibody repertoire size and reliability of self-non-self discrimination. Journal of Theoretical Biology, 81, 645\u2013670.","journal-title":"Journal of Theoretical Biology"},{"key":"44_CR38","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/1458502.1458525","volume-title":"WIDM \u201908: proceeding of the 10th ACM workshop on web information and data management","author":"R. K. Pon","year":"2008","unstructured":"Pon, R. K., C\u00e1rdenas, A. F., & Buttler, D. J. (2008). Online selection of parameters in the Rocchio algorithm for identifying interesting news articles. In WIDM \u201908: proceeding of the 10th ACM workshop on web information and data management (pp. 141\u2013148). New York: ACM Press."},{"issue":"3","key":"44_CR39","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"M. F. Porter","year":"1980","unstructured":"Porter, M. F. (1980). An algorithm for suffix stripping. Program, 14(3), 130\u2013137.","journal-title":"Program"},{"key":"44_CR40","unstructured":"Robertson, S., & Soboroff, I. (2001). The TREC 2001 filtering track report. In The tenth text retrieval conference (TREC-10) (pp. 26\u201337). NIST Special Publication 500-250."},{"key":"44_CR41","first-page":"313","volume-title":"Relevance feedback in information retrieval","author":"J. Rocchio","year":"1971","unstructured":"Rocchio, J. (1971). Relevance feedback in information retrieval (pp. 313\u2013323). Upper Saddle River: Prentice-Hall. Chap.\u00a014."},{"key":"44_CR42","first-page":"131","volume-title":"Congress on evolutionary computation","author":"A. Secker","year":"2003","unstructured":"Secker, A., Freitas, A. A., & Timmis, J. (2003). AISEC: an artificial immune system for e-mail classification. In R. Sarker, R. Reynolds, H. Abbass, T. Kay-Chen, R. McKay, D. Essam, & T. Gedeon (Eds.), Congress on evolutionary computation (pp. 131\u2013139). Piscataway: IEEE Press."},{"issue":"8","key":"44_CR43","first-page":"988","volume":"3","author":"H. Sorensen","year":"1997","unstructured":"Sorensen, H., O\u2019 Riordan, A., & O\u2019 Riordan, C. (1997). Profiling with the informer text filtering agent. Journal of Universal Computer Science, 3(8), 988\u20131006.","journal-title":"Journal of Universal Computer Science"},{"key":"44_CR44","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/S0022-5193(05)80152-3","volume":"153","author":"J. Stewart","year":"1991","unstructured":"Stewart, J., & Varela, F. J. (1991). Morphogenesis in shape-space, elementary meta-dynamics in a model of the immune network. Journal of Theoretical Biology, 153, 477\u2013498.","journal-title":"Journal of Theoretical Biology"},{"issue":"5","key":"44_CR45","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/S0167-5699(05)80046-5","volume":"12","author":"F. J. Varela","year":"1991","unstructured":"Varela, F. J., & Coutinho, A. (1991). Second generation immune network. Immunology Today, 12(5), 159\u2013166.","journal-title":"Immunology Today"},{"key":"44_CR46","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/0306-9877(78)90005-1","volume":"4","author":"N. M. Vaz","year":"1978","unstructured":"Vaz, N. M., & Varela, F. (1978). Self and non-sense: An organism-centered approach to immunology. Medical Hypotheses, 4, 231\u2013267.","journal-title":"Medical Hypotheses"},{"key":"44_CR47","volume-title":"State-of-the-art in content-based image and video retrieval","year":"2008","unstructured":"Veltkamp, R. C., Burkhardt, H., & Kriegel, H. P. (Eds.) (2008). State-of-the-art in content-based image and video retrieval. New York: Barnes & Noble."},{"key":"44_CR48","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1145\/1076034.1076054","volume-title":"SIGIR \u201905: Proceedings of the 28th annual international ACM SIGIR conference on research and development in information retrieval","author":"Y. Yang","year":"2005","unstructured":"Yang, Y., Yoo, S., Zhang, J., & Kisiel, B. (2005). Robustness of adaptive filtering methods in a cross-benchmark evaluation. In SIGIR \u201905: Proceedings of the 28th annual international ACM SIGIR conference on research and development in information retrieval (pp. 98\u2013105). New York: ACM Press."},{"key":"44_CR49","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/1008992.1009052","volume-title":"SIGIR \u201904: Proceedings of the 27th annual international ACM SIGIR conference on research and development in information retrieval","author":"Y. Zhang","year":"2004","unstructured":"Zhang, Y. (2004). Using Bayesian priors to combine classifiers for adaptive filtering. In SIGIR \u201904: Proceedings of the 27th annual international ACM SIGIR conference on research and development in information retrieval (pp. 345\u2013352). New York: ACM Press."}],"container-title":["Swarm Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11721-010-0044-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11721-010-0044-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11721-010-0044-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,7]],"date-time":"2021-11-07T11:26:22Z","timestamp":1636284382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11721-010-0044-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,27]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["44"],"URL":"https:\/\/doi.org\/10.1007\/s11721-010-0044-6","relation":{},"ISSN":["1935-3812","1935-3820"],"issn-type":[{"value":"1935-3812","type":"print"},{"value":"1935-3820","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,27]]}}}