{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:40:25Z","timestamp":1730205625788,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/cec.2014.6900498","type":"proceedings-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T17:35:57Z","timestamp":1412012157000},"page":"13-20","source":"Crossref","is-referenced-by-count":0,"title":["*-Tego \u2014 A framework for adversarial planning"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Ashlock","sequence":"first","affiliation":[{"name":"Department of Mathematics and Statistics, University of Guelph"}]},{"given":"Philip","family":"Hingston","sequence":"additional","affiliation":[{"name":"School of Computer and Security Science, Edith Cowan University"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1006\/jtbi.2000.2022"},{"journal-title":"Albegra","year":"1974","author":"hungerford","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2013.6557978"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2011.5949747"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.2466\/PR0.86.3.1219-1225"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1086\/285860"},{"key":"14","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1057\/ces.1994.6","article-title":"Cooperate or defect russian and american students in a prisoner's dilemma","volume":"176","author":"hemesath","year":"1994","journal-title":"Comparative Economics Studies"},{"key":"11","first-page":"9299","article-title":"Multiple worlds evolution for motif discovery","author":"brown","year":"2012","journal-title":"Proceedings of the 2012 IEEE Symposium on Bioinformatics and Computational Biology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CIBCB.2013.6595404"},{"key":"3","first-page":"453","article-title":"Multi-clustering: Avoiding the natural shape of underlying metrics","volume":"15","author":"ashlock","year":"2005","journal-title":"Smart Engineering System Design Neural Networks Evolutionary Programming and Artificial Life"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-9822(99)80321-2"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2009.2018704"},{"journal-title":"Evolutionary Computation for Opimization and Modeling","year":"2006","author":"ashlock","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256428"},{"key":"7","doi-asserted-by":"crossref","first-page":"2045","DOI":"10.1109\/CEC.2004.1331148","article-title":"The effect of tag recognition on nonlocal adaptation","volume":"2","author":"ashlock","year":"2004","journal-title":"Proceedings of the 2004 Congress on Evolutionary Computation"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2012.2234464"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2012.6374133"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.875423"},{"key":"9","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1126\/science.7466396","article-title":"The evolution of cooperation","volume":"211","author":"axelrod","year":"1981","journal-title":"Science"},{"journal-title":"The Evolution of Cooperation","year":"1984","author":"axelrod","key":"8"}],"event":{"name":"2014 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2014,7,6]]},"location":"Beijing, China","end":{"date-parts":[[2014,7,11]]}},"container-title":["2014 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6880677\/6900223\/06900498.pdf?arnumber=6900498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T14:14:30Z","timestamp":1672668870000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6900498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cec.2014.6900498","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}