{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:07:55Z","timestamp":1729634875606,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/cec.2012.6252888","type":"proceedings-article","created":{"date-parts":[[2012,8,6]],"date-time":"2012-08-06T16:51:10Z","timestamp":1344271870000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["An expressive GL-2 grammar for representing story-like scenarios"],"prefix":"10.1109","author":[{"given":"Vinh","family":"Bui","sequence":"first","affiliation":[]},{"given":"Axel","family":"Bender","sequence":"additional","affiliation":[]},{"given":"Hussein","family":"Abbass","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2007.4424497"},{"journal-title":"A Networked Multi-agent Combat Model Emergence Explained","year":"2007","author":"yang","key":"35"},{"key":"17","first-page":"177","volume":"1","author":"li","year":"1994","journal-title":"An Intelligent Scenarios Generator for Strategic Business Planning"},{"key":"36","first-page":"837","article-title":"Land combat scenario planning: A multiobjective approach","author":"yang","year":"2006","journal-title":"SEAL"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/0022-5193(68)90079-9"},{"journal-title":"Narrative Theory A Brief Introduction","year":"2011","author":"talib","key":"33"},{"journal-title":"Genetic Programming On the Programming of Computers by Means of Natural Selection","year":"1992","author":"koza","key":"15"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17298-4_14"},{"journal-title":"7 Deadly Scenarios A Military Futurist Explores War in the 21st Century","year":"2009","author":"krepinevich","key":"16"},{"key":"13","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/1047788.1047796","article-title":"A model based reasoning approach for generating plausible crime scenarios from evidence","author":"keppens","year":"2003","journal-title":"ICAIL '03"},{"key":"14","first-page":"461","article-title":"Designing neural networks using genetic algorithms with graph generation system","volume":"4","author":"kitano","year":"1990","journal-title":"Complex System"},{"journal-title":"Neural Network synthesis using cellular encoding and the genetic algorithm","year":"1994","author":"gruau","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/AICT-ICIW.2006.52"},{"key":"21","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1007\/978-3-540-24653-4_49","article-title":"Aesthetic evolution of L-Systems revisited","author":"mccormack","year":"2004","journal-title":"Applications of Evolutionary Computing"},{"journal-title":"Storying Corporate Futures The Shell Scenarios","year":"1998","author":"marcus","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1117\/12.672883"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1093\/imaman\/dpm026"},{"journal-title":"The design and implementation of a graph rewrite engine for model transformations","year":"2005","author":"nupponen","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1177\/10778004008003008"},{"journal-title":"Enhancing Strategic Planning With Massive Scenario Generation Theory and Experiments","year":"2007","author":"paul","key":"26"},{"journal-title":"Competitive Advantage","year":"1985","author":"porter","key":"27"},{"journal-title":"Scenario Planning Managing for the Future 2nd Edition","year":"2006","author":"ringland","key":"28"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.1142\/3303","article-title":"Foundations","volume":"1","author":"rozenberg","year":"1997","journal-title":"Handbook of Graph Grammars and Computing by Graph Transformation"},{"journal-title":"Evolving Complexity Towards Risk A Massive Scenario Generation Approach for Evaluating Advanced Air Traffic Management Concepts","year":"2008","author":"alam","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389378"},{"key":"10","first-page":"1113","article-title":"Bayesian network models for generation of crisis management training scenarios","author":"grois","year":"0","journal-title":"Proceedings of IAAI-98 Menlo Park CA USA 1998"},{"key":"1","article-title":"The causes for no causation: A computational perspective","author":"abbass","year":"2012","journal-title":"Information Knowledge Systems Management"},{"journal-title":"The Art of the Long View Planning for the Future in an Uncertain World","year":"1996","author":"schwartz","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5585934"},{"journal-title":"Using L-systems As Graph Grammar G2l-systems","year":"1995","author":"boers","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1004508"},{"journal-title":"Automatic Scenario Generation from A Multidimensional Requirements Model","year":"2007","author":"asbill","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1330895"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2009.4983211"},{"journal-title":"Story and Discourse Narrative Structure in Fiction and Film","year":"1980","author":"chatman","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2009.4983000"}],"event":{"name":"2012 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2012,6,10]]},"location":"Brisbane, Australia","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6241678\/6252855\/06252888.pdf?arnumber=6252888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T11:38:21Z","timestamp":1562067501000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6252888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/cec.2012.6252888","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}