{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:59:01Z","timestamp":1725415141517},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/cason.2013.6622596","type":"proceedings-article","created":{"date-parts":[[2013,10,11]],"date-time":"2013-10-11T22:58:09Z","timestamp":1381532289000},"page":"32-37","source":"Crossref","is-referenced-by-count":4,"title":["Evolution of cooperative strategies for iterated prisoner's dilemma on networks"],"prefix":"10.1109","author":[{"given":"Hisao","family":"Ishibuchi","sequence":"first","affiliation":[]},{"given":"Takahiko","family":"Sudo","sequence":"additional","affiliation":[]},{"given":"Koichiro","family":"Hoshino","sequence":"additional","affiliation":[]},{"given":"Yusuke","family":"Nojima","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2011.6032022"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.200327197"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256442"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2011.2167682"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1142\/6461","author":"kendall","year":"2007","journal-title":"The Iterated Prisoners Dilemma 20 Years On"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1993.1.1.77"},{"key":"1","first-page":"32","article-title":"The evolution of strategies in the iterated prisoner's dilemma","author":"axelrod","year":"1987","journal-title":"Genetic Algorithms and Simulated Annealing"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.09.007"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2011.2109718"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.856198"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1006\/jtbi.1999.1000"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/0303-2647(95)01541-8"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2010.08.004"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2007.368078"}],"event":{"name":"2013 Fifth International Conference on Computational Aspects of Social Networks (CASoN)","start":{"date-parts":[[2013,8,12]]},"location":"Fargo, ND","end":{"date-parts":[[2013,8,14]]}},"container-title":["2013 Fifth International Conference on Computational Aspects of Social Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6603434\/6622594\/06622596.pdf?arnumber=6622596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T16:15:57Z","timestamp":1580919357000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6622596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cason.2013.6622596","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}