{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:26:42Z","timestamp":1775755602451,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/foci.2013.6602455","type":"proceedings-article","created":{"date-parts":[[2013,9,25]],"date-time":"2013-09-25T22:06:57Z","timestamp":1380146817000},"page":"52-59","source":"Crossref","is-referenced-by-count":7,"title":["A ripple-spreading algorithm for route optimization"],"prefix":"10.1109","author":[{"given":"Xiao-Bing","family":"Hu","sequence":"first","affiliation":[]},{"given":"Ming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Mark S.","family":"Leeson","sequence":"additional","affiliation":[]},{"given":"Ezequiel","family":"Di Paolo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TSSC.1968.300136"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(85)90084-0"},{"key":"18","author":"pearl","year":"1984","journal-title":"Heuristics Intelligent Search Strategies for Computer Problem Solving"},{"key":"15","author":"cormen","year":"2001","journal-title":"INTRODUCTION TO ALGORITHMS Second Edition"},{"key":"16","article-title":"Algorithm design: Foundations","author":"goodrich","year":"2001","journal-title":"Analysis and Internet Examples"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-007-0281-3"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2005.03.027"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2011.09.002"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2005.03.015"},{"key":"21","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/1056777.1056779","article-title":"Correction to \"a formal basis for the heuristic determination of minimum cost paths","volume":"37","author":"hart","year":"1972","journal-title":"SigArt Newsletter"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/3828.3830"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(01)00094-7"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1787234.1787249"},{"key":"25","first-page":"599","article-title":"Dijkstra's algorithm revisited: The dynamic programming connexion","volume":"35","author":"sniedovich","year":"2006","journal-title":"Journal of Control and Cybernetics"},{"key":"26","year":"0"},{"key":"27","year":"0"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585888"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-05094-1","author":"eiben","year":"2003","journal-title":"Introduction to Evolutionary Computing"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(95)00078-S"},{"key":"1","author":"holland","year":"1975","journal-title":"Adaptation in Natural and Artificial Systems"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00011"},{"key":"6","first-page":"46123","article-title":"A deterministic ripple-spreading model for random complex networks","volume":"83","author":"hu","year":"2011","journal-title":"Phys Rev (E"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(99)00107-0"},{"key":"4","author":"russell","year":"2010","journal-title":"Artificial Intelligence A Modern Approach"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2005.09.012"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5586023"}],"event":{"name":"2013 IEEE Symposium on Foundations of Computational Intelligence (FOCI)","location":"Singapore","start":{"date-parts":[[2013,4,16]]},"end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Foundations of Computational Intelligence (FOCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588679\/6602446\/06602455.pdf?arnumber=6602455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,6]],"date-time":"2022-03-06T22:23:48Z","timestamp":1646605428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6602455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/foci.2013.6602455","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}