{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:07:30Z","timestamp":1729678050529,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/cibim.2013.6607911","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:38:24Z","timestamp":1380652704000},"page":"36-41","source":"Crossref","is-referenced-by-count":1,"title":["Genetic Heuristic Development: Feature selection for author identification"],"prefix":"10.1109","author":[{"given":"Joshua","family":"Adams","sequence":"first","affiliation":[]},{"given":"Henry","family":"Williams","sequence":"additional","affiliation":[]},{"given":"Joi","family":"Carter","sequence":"additional","affiliation":[]},{"given":"Gerry","family":"Dozier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2012","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2012.047642"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9_1"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.59"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SECon.2012.6197061"},{"journal-title":"EXploration Toolset for the Optimization of Launch and Space Systems","year":"2012","author":"toolss","key":"14"},{"key":"11","first-page":"1","article-title":"Software forensics: Extending authorship analysis techniques to computer programs","author":"gray","year":"1997","journal-title":"Proc 3rd Biannual Conf Int Assoc of Forensic Linguists (IAFL'97)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121951"},{"key":"21","first-page":"2725","article-title":"A comparison of GECbased feature selection and weighting for multimodal biometric recognition","author":"alford","year":"2011","journal-title":"IEEE Congress on Evolutionary Computation (CEC)"},{"year":"2012","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339056"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICAT.2011.6102123"},{"key":"24","first-page":"1872","author":"darwin","year":"0","journal-title":"The Origin of Species"},{"key":"25","article-title":"Uniform crossover in genetic algorithms","author":"syswerda","year":"1989","journal-title":"Proceedings of the 3rd International Conferene on Genetic Algorithms"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"26"},{"key":"27","article-title":"Genetic &evolutionary biometrics: Exploring value preference space for hybrid featrue weighting and selection","volume":"6","author":"alford","year":"0","journal-title":"To Appear in the International Journal of Intelligent Computing &Cybernetics"},{"year":"0","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.08.008"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1201\/9781420058147.ch17"},{"journal-title":"Genetic Algorithms in Search Optimization &Machine Learning","year":"1989","author":"goldberg","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)00005-9"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"7","first-page":"29","author":"crain","year":"1998","journal-title":"The Bard's Fingerprints"},{"key":"6","doi-asserted-by":"crossref","first-page":"601","DOI":"10.2307\/2589242","article-title":"Separating hyperplanes and the authorship of the disputed federalist papers","volume":"105","author":"bosch","year":"1998","journal-title":"American Mathematical Monthly"},{"key":"5","article-title":"Genetic &evolutionary methods for biometric feature reduction","author":"alford","year":"2011","journal-title":"Special Issue on Computational Intelligence in Biometrics Theory Methods and Applications"},{"key":"4","article-title":"Genetic and evolutionary feature extraction via x-toolss","author":"shelton","year":"2011","journal-title":"The 8th International Conference on Genetic and Evolutionary Methods (GEM)"},{"journal-title":"Authorship Analysis Identifying the Author of A Program","year":"1994","author":"krsul","key":"9"},{"key":"8","first-page":"53","article-title":"Identifed: Software authorship analysis with case-based reasoning","author":"sallis","year":"1997","journal-title":"Proc Addendum Session Int Conf Neural Info Processing and Intelligent Info Systems"}],"event":{"name":"2013 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","start":{"date-parts":[[2013,4,16]]},"location":"Singapore, Singapore","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6595340\/6607904\/06607911.pdf?arnumber=6607911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:55:28Z","timestamp":1498085728000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6607911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cibim.2013.6607911","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}