{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T12:56:03Z","timestamp":1770468963824,"version":"3.49.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1998,3,1]],"date-time":"1998-03-01T00:00:00Z","timestamp":888710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1998,3,1]],"date-time":"1998-03-01T00:00:00Z","timestamp":888710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Intelligence"],"published-print":{"date-parts":[[1998,3]]},"DOI":"10.1023\/a:1008227606285","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T13:47:34Z","timestamp":1040564854000},"page":"103-111","source":"Crossref","is-referenced-by-count":18,"title":["An Accelerated Genetic Algorithm"],"prefix":"10.1007","volume":"8","author":[{"given":"John R.","family":"Podlena","sequence":"first","affiliation":[]},{"given":"Tim","family":"Hendtlass","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"159019_CR1","volume-title":"Artificial Life III","author":"D.H. Ackley","year":"1993","unstructured":"D.H. Ackley and M.L. Littman, \u201cA case for Lamarkian evolution,\u201d in Artificial Life III, edited by C.G. Langton, Addison-Wesley: Reading, MA, 1993."},{"key":"159019_CR2","doi-asserted-by":"crossref","unstructured":"J.M. Baldwin, \u201cAnewfactor in evolution,\u201d American Naturalist, vol. 30, pp. 441-451.","DOI":"10.1086\/276408"},{"key":"159019_CR3","volume-title":"Handbook of Genetic Algorithms","author":"L. Davis","year":"1991","unstructured":"L. Davis, Handbook of Genetic Algorithms, Van Nostrand Rienhold: New York, 1991."},{"key":"159019_CR4","unstructured":"L. Davis, \u201cBit-climbing, representational bias, and test suite design,\u201d in Proc. of the Fourth Int. Conf. on Genetic Algorithms, California, July 1991, pp. 18-23."},{"key":"159019_CR5","volume-title":"Analysis of the behavior of a class of genetic adaptive systems","author":"K.A. De Jong","year":"1975","unstructured":"K.A. De Jong, \u201cAnalysis of the behavior of a class of genetic adaptive systems,\u201d Ph.D. Dissertation, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, MI, 1975."},{"key":"159019_CR6","volume-title":"Genetic Algorithms in Search, Optimisation, and Machine Learning","author":"L.J. Eshelman","year":"1989","unstructured":"L.J. Eshelman, \u201cThe CHC adaptive search algorithm: How to have safe search when engaging in nontraditional genetic recombination,\u201d in Genetic Algorithms in Search, Optimisation, and Machine Learning, edited by D.E. Goldberg, Addison-Wesley Publishing Company: Reading, MA, 1989."},{"key":"159019_CR7","unstructured":"L.J. Eshelman and J.D. Shaffer, \u201cPreventing premature convergence in genetic algorithms by preventing inscest,\u201d ICGA, 1991."},{"key":"159019_CR8","unstructured":"T. Hendtlass and J. Wells, \u201cThe discrimination of short acoustic events by artificial neural networks,\u201d in Proc. of ANNES, IEEE Press, New Zealand, 1993."},{"key":"159019_CR9","doi-asserted-by":"crossref","unstructured":"J.H. Holland, Adaption in Natural and Artificial Systems, second edition, MIT Press, 1992.","DOI":"10.7551\/mitpress\/1090.001.0001"},{"key":"159019_CR10","unstructured":"International Workshop on Combinations of Genetic Algorithms and Neural Networks, COGANN-92, IEEE Computer Society Press: California, 1992."},{"key":"159019_CR11","unstructured":"C.Z. Janikow and Z. Michalewicz, \u201cAn experimental comparison of binary and floating point representations in genetic algorithms,\u201d in Proc. of the Fourth Int. Conf. on Genetic Algorithms, California, July 1991, pp. 31-36."},{"key":"159019_CR12","doi-asserted-by":"crossref","unstructured":"T. Kohonen, \u201cStatistical pattern recognition with neural networks: Benchmark studies,\u201d in Proc. of the Second Annual IEEE Int. Conf. on Neural Networks, vol. 1, 1988.","DOI":"10.1109\/ICNN.1988.23829"},{"key":"159019_CR13","unstructured":"J.R. Podlena and T. Hendtlass, \u201cEvolving complex neural networks that age,\u201d in Proc. of the IEEE Int. Conf. on Evolutionary Computing, 1995."},{"key":"159019_CR14","unstructured":"J.D. Schaffer, R.A. Caruana, L.J. Eshelman, and R. Das, \u201cA study of control parameters affecting online performance of genetic algorithms for function optimisation,\u201d in Proc. of the Third Int. Conf. on Genetic Algorithms, California, June 1989, pp. 51-60."},{"issue":"1","key":"159019_CR15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1287\/moor.6.1.19","volume":"6","author":"F.J. Solis","year":"1981","unstructured":"F.J. Solis and R.J.B. Wets, \u201cMinimisation by random search techniques,\u201d Mathematics of Operations Research, vol. 6, no.1, pp. 19-30, 1981.","journal-title":"Mathematics of Operations Research"},{"key":"159019_CR16","doi-asserted-by":"crossref","unstructured":"D. Sprecht, \u201cProbabilistic neural networks for classification, mapping and associative memory,\u201d in ICNN-88 Conf. Proc., 1988.","DOI":"10.1109\/ICNN.1988.23887"},{"key":"159019_CR17","doi-asserted-by":"crossref","unstructured":"D. Sprecht, \u201cProbabilistic neural networks,\u201d Neural Networks, Nov. 1990.","DOI":"10.1016\/0893-6080(90)90049-Q"},{"key":"159019_CR18","unstructured":"D. Whitely, \u201cThe GENITOR algorithm and selection pressure: Why rank-based allocation of reproductive trials is best,\u201d ICGA, 1989."},{"key":"159019_CR19","first-page":"123","volume-title":"Annals of Operations Research","author":"D.L. Woodruff","year":"1993","unstructured":"D.L. Woodruff and E. Zemel, \u201cHashing vectors for tabu search,\u201d Annals of Operations Research, vol. 41, pp. 123-137, J.C. Baltzer AG: Switzerland, 1993."}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008227606285.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008227606285\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008227606285.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:59:41Z","timestamp":1747580381000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008227606285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,3]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1998,3]]}},"alternative-id":["159019"],"URL":"https:\/\/doi.org\/10.1023\/a:1008227606285","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,3]]}}}