{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:44:34Z","timestamp":1729665874799,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/cybconf.2013.6617448","type":"proceedings-article","created":{"date-parts":[[2013,10,10]],"date-time":"2013-10-10T23:29:20Z","timestamp":1381447760000},"page":"80-85","source":"Crossref","is-referenced-by-count":6,"title":["Combining expression trees"],"prefix":"10.1109","author":[{"given":"Joanna","family":"Jedrzejowicz","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Jedrzejowicz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.211"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72523-7_46"},{"key":"22","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/978-3-540-76280-5_14","article-title":"Review of classifier combination methods","volume":"90","author":"tulyakov","year":"2008","journal-title":"Machine Learning in Document Analysis and Recognition Studies in Computational Intelligence"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/34.982906"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2005","author":"witten","key":"23"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00223-X"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24016-4_4"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.02.135"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13541-5_21"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22000-5_51"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1024691352"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2008.06.002"},{"journal-title":"UCI Machine Learning Repository","year":"2007","author":"asuncion","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04441-0_56"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-32849-1_2"},{"key":"5","first-page":"87","article-title":"Gene expression programming: A new adaptive algorithm for solving problems","volume":"13","author":"ferreira","year":"2001","journal-title":"Complex Systems"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1048415"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70720-2_10"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"}],"event":{"name":"2013 IEEE International Conference on Cybernetics (CYBCO)","start":{"date-parts":[[2013,6,13]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2013,6,15]]}},"container-title":["2013 IEEE International Conference on Cybernetics (CYBCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6599033\/6617421\/06617448.pdf?arnumber=6617448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T19:19:47Z","timestamp":1646767187000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6617448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cybconf.2013.6617448","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}