{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:02:27Z","timestamp":1729609347300,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/cec.2011.5949735","type":"proceedings-article","created":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T16:51:24Z","timestamp":1311180684000},"page":"1063-1070","source":"Crossref","is-referenced-by-count":1,"title":["Shopkeeper strategies in the iterated prisoner's dilemma"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Ashlock","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Kuusela","sequence":"additional","affiliation":[]},{"given":"Monica","family":"Cojocaru","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1006\/jtbi.2000.2022"},{"key":"ref32","first-page":"459","article-title":"Darwin's continent cycle theory and its simulation by the prisoner's dilemma","volume":"5","author":"m\u00fchlenbein","year":"1991","journal-title":"Complex Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2681(95)00052-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2006.871253"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-9822(99)80321-2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CIBCB.2006.330957"},{"key":"ref10","first-page":"75","article-title":"Acquisition of general adaptive features by evolution","author":"ashlock","year":"0","journal-title":"Proceedings of the 7th Annual Conference on Evolutionary Programming"},{"key":"ref11","first-page":"272","article-title":"A model of emotion in the prisoner's dilemma","author":"ashlock","year":"0","journal-title":"Proceedings of the 2008 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4630965"},{"key":"ref13","first-page":"4073","article-title":"Fingerprint analysis of the noisy prisoner's dilemma","author":"ashlock","year":"0","journal-title":"Proceedings of the 2007 Congress on Evolutionary Computation"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FOCI.2007.372186"},{"journal-title":"Using priosoner's dilemma fingerprints to analyse evolved strategies Master's thesis","year":"2008","author":"ashlock","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688322"},{"journal-title":"The Evolution of Cooperation","year":"1984","author":"axelrod","key":"ref17"},{"key":"ref18","first-page":"1390","volume":"211","author":"axelrod","year":"1981","journal-title":"The Evolution of Cooperation Science"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2711-1","author":"borg","year":"1997","journal-title":"Modern Multidimensional Scaling Theory and Applications"},{"key":"ref28","article-title":"Analysis of Game Playing Agents with Fingerprints","author":"kim","year":"2005","journal-title":"PhD thesis"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(94)90289-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CIBCB.2006.330946"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1330882"},{"journal-title":"Numerical Ecology","year":"1998","author":"legendre","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.920675"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2009.2018704"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2005.1555022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2006.311689"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.875423"},{"article-title":"Evolutionary Computation for Opimization and Modeling","year":"2006","author":"ashlock","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.856200"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1993.1.1.77"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04245-8","author":"de berg","year":"2000","journal-title":"Computational Geometry Algorithms and Applications"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1057\/ces.1994.6","article-title":"Cooperate or defect? Russian and American students in a prisoner's dilemma","volume":"176","author":"hemesath","year":"1994","journal-title":"Comparative Economics Studies"},{"journal-title":"Artificial Intelligence Through Simulated Evolution","year":"1966","author":"fogel","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688416"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.2466\/pr0.2000.86.3c.1219","article-title":"Competitiveness and conflict behavior in simulation of a social dilemma","volume":"86","author":"houston","year":"2000","journal-title":"Psychological Reports"}],"event":{"name":"2011 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2011,6,5]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2011,6,8]]}},"container-title":["2011 IEEE Congress of Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5936494\/5949581\/05949735.pdf?arnumber=5949735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,21]],"date-time":"2020-06-21T09:11:03Z","timestamp":1592730663000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949735\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cec.2011.5949735","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}