{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:34:42Z","timestamp":1752986082678,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icca.2013.6564940","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T21:08:04Z","timestamp":1374786484000},"page":"870-877","source":"Crossref","is-referenced-by-count":3,"title":["Efficient, swarm-based path finding in unknown graphs using reinforcement learning"],"prefix":"10.1109","author":[{"given":"M.","family":"Aurangzeb","sequence":"first","affiliation":[]},{"given":"F. L.","family":"Lewis","sequence":"additional","affiliation":[]},{"given":"M.","family":"Huber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/NABIC.2009.5393690"},{"year":"0","author":"rai","key":"35"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299565"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.4171\/OWR\/2010\/11"},{"journal-title":"A Novel Heuristic Optimization Method Charged System Search","year":"2010","author":"kaveh","key":"18"},{"journal-title":"Maze Classification","year":"2011","author":"pullen","key":"33"},{"journal-title":"Optimization learning and natural algorithms","year":"1992","author":"dorigo","key":"15"},{"journal-title":"Maze Solving Algorithm","year":"0","key":"34"},{"key":"16","article-title":"An idea based on honey bee swarm for numerical optimization","author":"karaboga","year":"2005","journal-title":"Tech Rep TR"},{"key":"39","article-title":"Research on the probability of judgments in criminal and civil matters","author":"poisson","year":"1838","journal-title":"Elibron Classics"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195131581.001.0001","author":"bonabeau","year":"1999","journal-title":"Swarm Intelligence From Natural to Artificial Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9127-4"},{"journal-title":"Reinforcement Learning-An Introduction","year":"1998","author":"sutton","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.907334"},{"key":"38","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1613\/jair.301","article-title":"Reinforcement learning: A survey","volume":"4","author":"kaelbling","year":"1996","journal-title":"Journal of Artificial Intelligence Research"},{"key":"12","article-title":"Building an artificial immune network for decentralized policy negotiation in a communication end system","author":"suzuki","year":"2000","journal-title":"Proc 4th World Conf SCI"},{"key":"21","first-page":"169","article-title":"Firefly algorithms for multimodal optimization. Stochastic Algorithms","author":"yang","year":"2009","journal-title":"Foundations and Applications SAGA 2009 Lecture Notes in Computer Sciences 5792"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1504\/IJMMNO.2010.035430"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-6492-1_54"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/BF01417909"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/BF00462870"},{"journal-title":"IEEE Guidelines for 64 Bits Global Identifier","year":"1997","key":"40"},{"journal-title":"Toolbox to Create a Maze in MatLab","year":"2003","author":"kubica","key":"45"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/3477.484436"},{"journal-title":"Internal Structure and Dynamic Decisions for Coalitions on Graphs","year":"0","author":"aurangzeb","key":"46"},{"key":"22","first-page":"97","article-title":"Some hybrid models to improve firefly algorithm performance","volume":"8 s","author":"farahani","year":"2012","journal-title":"Int J Artificial Intelligence"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.03.004"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2009.022775"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2008.313"},{"key":"27","article-title":"Using river formation dynamics to design heuristic algorithms","volume":"4618","author":"rabanal","year":"2007","journal-title":"Lecture Notes In Computer Science 2007"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1142\/S0218202508003005"},{"key":"29","first-page":"329","article-title":"stochastic searching networks","author":"bishop","year":"1989","journal-title":"Artificial Neural Networks 1989 First IEE International Conference on (Conf Publ No 313)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1986.4308978"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WMTE.2004.1281337"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.920231"},{"journal-title":"Turtle Geometry","year":"1980","author":"abelson","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008033229660"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015664517164"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011219024159"},{"year":"0","key":"32"},{"key":"5","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1023\/B:JINT.0000021023.56384.55","article-title":"Autonomous learning architecture for environmental mapping","volume":"39","author":"silva jr","year":"2004","journal-title":"Journal of Intelligent and Robotic Systems"},{"key":"31","article-title":"Experience outweighs intelligence: An investigation into the use of ant colony systems for maze solving","author":"jones","year":"2003","journal-title":"Proceedings of the ACIS Fourth International Conference on Software Engineering Artificial Intelligence Networking and Parallel\/Distributed Computing (SNPD'03)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/3477.931512"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.900665"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014463014150"}],"event":{"name":"2013 10th IEEE International Conference on Control and Automation (ICCA)","start":{"date-parts":[[2013,6,12]]},"location":"Hangzhou, China","end":{"date-parts":[[2013,6,14]]}},"container-title":["2013 10th IEEE International Conference on Control and Automation (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6550152\/6564841\/06564940.pdf?arnumber=6564940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T04:19:39Z","timestamp":1646194779000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6564940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/icca.2013.6564940","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}