{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T20:45:44Z","timestamp":1760820344112,"version":"3.38.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cisda.2011.5945953","type":"proceedings-article","created":{"date-parts":[[2011,7,21]],"date-time":"2011-07-21T15:14:59Z","timestamp":1311261299000},"page":"31-38","source":"Crossref","is-referenced-by-count":2,"title":["Modelling Search and Rescue systems with dynamical networks"],"prefix":"10.1109","author":[{"given":"Irene","family":"Pestov","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Pilat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Arctic Front Defending Canada in the Far North","year":"2008","author":"coates","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068105"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1063\/1.2751266"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.046106"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.804323"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3927.001.0001","author":"mitchell","year":"1996","journal-title":"An Introduction to Genetic Algorithms"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.21236\/ADA487287","author":"carley","year":"2008","journal-title":"ORA User's Guide 2008"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01284-6_4"},{"journal-title":"Evolutionary Computation A Unified Approach","year":"2006","author":"de jong","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"journal-title":"National SAR Program Plan 2006","year":"2006","key":"20"},{"journal-title":"Canada Flight Supplement","year":"2008","key":"22"},{"key":"23","first-page":"1","article-title":"Evolutionary computation on complex spatially-distributed networks","author":"pestov","year":"2010","journal-title":"Proc Genetic and Evolutionary Computation Conf (GECCO 2010)"},{"journal-title":"Major Air Disaster Response in Northern Canada Heavy Transport","year":"2007","author":"scales","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ALIFE.2007.367799"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01284-6_15"},{"key":"3","first-page":"1","article-title":"Defence and security applications of network technologies","author":"pestov","year":"2009","journal-title":"SIAM Int Conf on Data Mining Workshop on Link Analysis Coun-terterrorism and Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"journal-title":"The Structure and Dynamics of Networks","year":"2006","author":"newman","key":"1"},{"journal-title":"Dynamic Network Analysis for Understanding Complex Systems and Processes","year":"2009","author":"pestov","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356527"},{"key":"6","first-page":"1","article-title":"Adaptive networks","author":"gross","year":"2009","journal-title":"Adaptive Networks Theory Models and Applications"},{"key":"5","first-page":"1","volume":"2","author":"aldana","year":"2002","journal-title":"Boolean dynamics with random couplings"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"9","first-page":"1","article-title":"Dynamic network analysis","author":"carley","year":"2008","journal-title":"The NRC Workshop on Social Network Modeling and Analysis"},{"journal-title":"Capability Engineering Transforming Defence Acquisition in Canada","year":"2004","author":"pagotto","key":"8"}],"event":{"name":"2011 Ieee Symposium On Computational Intelligence For Security And Defence Applications - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937061\/5945936\/05945953.pdf?arnumber=5945953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T07:23:06Z","timestamp":1741332186000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5945953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cisda.2011.5945953","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}