{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:19:30Z","timestamp":1725452370179},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/cisda.2013.6595425","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:56:27Z","timestamp":1379591787000},"page":"38-44","source":"Crossref","is-referenced-by-count":0,"title":["Cooperative path planning for UAVs with UAV loss considerations"],"prefix":"10.1109","author":[{"family":"Mingsheng Gao","sequence":"first","affiliation":[]},{"family":"Jun Jiang","sequence":"additional","affiliation":[]},{"family":"Ng Kien Ming","sequence":"additional","affiliation":[]},{"family":"Teo Kwong Meng","sequence":"additional","affiliation":[]},{"family":"Kim-Leng Poh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(02)00363-6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389386"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2002.804370"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1108\/00022660710758222"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-009-9359-1"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389383"},{"key":"3","article-title":"Cooperative real-time search and task allocation in uav teams","author":"jin","year":"2003","journal-title":"Proc 0020IEEE Decision and Control (CDC)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2001.933238"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.2514\/6.2000-4370"},{"key":"10","article-title":"Probabilistic path planning for uavs","author":"dogan","year":"2003","journal-title":"Proc AIAA 2nd Unmanned Unlimited System"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.2514\/6.2005-6079"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120603"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2006.09.013"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2002.1184270"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2000.878915"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2006.253618"}],"event":{"name":"2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2013,4,16]]},"location":"Singapore","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588670\/6595418\/06595425.pdf?arnumber=6595425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T17:31:27Z","timestamp":1490203887000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6595425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cisda.2013.6595425","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}