{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:59:45Z","timestamp":1757311185599},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540793540"},{"type":"electronic","value":"9783540793557"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79355-7_27","type":"book-chapter","created":{"date-parts":[[2008,8,11]],"date-time":"2008-08-11T09:20:59Z","timestamp":1218446459000},"page":"279-288","source":"Crossref","is-referenced-by-count":4,"title":["A Genetic Algorithm with Multiple Operators for Solving the Terminal Assignment Problem"],"prefix":"10.1007","author":[{"given":"Eug\u00e9nia Moreira","family":"Bernardino","sequence":"first","affiliation":[]},{"given":"Anabela Moreira","family":"Bernardino","sequence":"additional","affiliation":[]},{"given":"Juan Manuel","family":"S\u00e1nchez-P\u00e9rez","sequence":"additional","affiliation":[]},{"given":"Juan Antonio","family":"G\u00f3mez-Pulido","sequence":"additional","affiliation":[]},{"given":"Miguel Angel","family":"Vega-Rodr\u00edguez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","first-page":"2343","volume-title":"IEEE Transaction On Systems, Man and Cybernetics","author":"S. Salcedo-Sanz","year":"2004","unstructured":"Salcedo-Sanz, S., Yao, X.: A Hybrid Hopfield network-genetic algorithm approach for the terminal assignment problem. In: IEEE Transaction On Systems, Man and Cybernetics, vol.\u00a034, pp. 2343\u20132353. IEEE Press, USA (2004)"},{"key":"27_CR2","first-page":"129","volume-title":"Recent Advances in Memetic Algorithms and related search technologies","author":"X. Yao","year":"2004","unstructured":"Yao, X., Wang, F., Padmanabhan, K., Salcedo-Sanz, S.: Hybrid evolutionary approaches to terminal assignment in communications networks. In: Hart, W.E., Krasnogor, N., Smith, J.E. (eds.) Recent Advances in Memetic Algorithms and related search technologies, pp. 129\u2013159. Springer, New York (2004)"},{"key":"27_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-05094-1","volume-title":"Introduction to Evolutionary Computing","author":"A.E. Eiben","year":"2003","unstructured":"Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer, Berlin (2003)"},{"key":"27_CR4","first-page":"74","volume-title":"22nd Annual ACM Computer Science Conference","author":"F. Abuali","year":"2004","unstructured":"Abuali, F., Schoenefeld, D., Wainwright, R.: Terminal assignment in a Communications Network Using Genetic Algorithms. In: 22nd Annual ACM Computer Science Conference, pp. 74\u201381. ACM Press, New York (2004)"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1145\/331697.331748","volume-title":"ACM Symposium on Applied Computing","author":"S. Khuri","year":"1997","unstructured":"Khuri, S., Chiu, T.: Heuristic Algorithms for the Terminal Assignment Problem. In: ACM Symposium on Applied Computing, pp. 247\u2013251. ACM Press, New York (1997)"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1016\/0026-2714(93)90132-I","volume":"33","author":"M. Atiqullah","year":"1993","unstructured":"Atiqullah, M., Rao, S.: Reliability optimization of communication networks using simulated annealing. Microelectronics and Reliability\u00a033, 1303\u20131319 (1993)","journal-title":"Microelectronics and Reliability"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/0952-1976(94)00041-K","volume":"8","author":"S. Pierre","year":"1995","unstructured":"Pierre, S., Hyppolite, M.A., Bourjolly, J.M., Dioume, O.: Topological design of computer communication networks using simulated annealing. Engineering Applications of Artificial Intelligence\u00a08, 61\u201369 (1995)","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/BF02073940","volume":"33","author":"F. Glover","year":"1991","unstructured":"Glover, F., Lee, M., Ryan, J.: Least-cost network topology design for a new service: and application of a tabu search. Annals of Operations Research\u00a033, 351\u2013362 (1991)","journal-title":"Annals of Operations Research"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/0360-8352(95)00036-Z","volume":"28","author":"S.J. Koh","year":"1995","unstructured":"Koh, S.J., Lee, C.Y.: A tabu search for the survivable fiber optic communication network design. Computers and Industrial Engineering\u00a028, 689\u2013700 (1995)","journal-title":"Computers and Industrial Engineering"},{"key":"27_CR10","first-page":"2302","volume-title":"IEEE Conference in Evolutionary Computation","author":"Y. Xu","year":"2004","unstructured":"Xu, Y., Salcedo-Sanz, S., Yao, X.: Non-standard cost terminal assignment problems using tabu search approach. In: IEEE Conference in Evolutionary Computation, vol.\u00a02, pp. 2302\u20132306. IEEE Press, Portland (2004)"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.engappai.2005.10.003","volume":"19","author":"S. Salcedo-Sanz","year":"2006","unstructured":"Salcedo-Sanz, S., Portilla-Figueras, J.A., Garc\u00eda-V\u00e1zquez, F., Jim\u00e9nez-Fern\u00e1ndez, S.: Solving terminal assignment problems with groups encoding: the wedding banquet problem. Engineering Applications of Artificial Intelligence\u00a019, 569\u2013578 (2006)","journal-title":"Engineering Applications of Artificial Intelligence"},{"unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems. The University of Michigan Press (1975)","key":"27_CR12"},{"key":"27_CR13","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison Wesley, Boston (1989)"}],"container-title":["Studies in Computational Intelligence","New Challenges in Applied Intelligence Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79355-7_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:19:59Z","timestamp":1619507999000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79355-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540793540","9783540793557"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79355-7_27","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[]}}