{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:29:45Z","timestamp":1730298585533,"version":"3.28.0"},"reference-count":67,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/ssci.2018.8628683","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T23:15:32Z","timestamp":1551395732000},"page":"112-119","source":"Crossref","is-referenced-by-count":16,"title":["A Survey on Graph-based Systems in Manufacturing Processes"],"prefix":"10.1109","author":[{"given":"Jens","family":"Weise","sequence":"first","affiliation":[]},{"given":"Steven","family":"Benkhardt","sequence":"additional","affiliation":[]},{"given":"Sanaz","family":"Mostaghim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A graph-based clustering algorithm for anomaly intrusion detection","year":"2012","author":"mingqiang","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2015.04.086"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3182\/20020721-6-ES-1901.00017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/002075400188988"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/0010-4485(88)90050-4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2017.05.001"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cad.2014.07.002"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-015-7873-9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25730-3"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.07.024"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2015.7354002"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/APWeb.2010.60"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CYBER.2014.6917456"},{"key":"ref63","first-page":"669","volume":"8","author":"da xu","year":"2012","journal-title":"AutoAssem An Automated Assembly Planning System for Complex Products"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2017.8016135"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.05.007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-988-0_11"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2017.2682265"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23677"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/544220.544231"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/S0007-8506(07)60997-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.07.045"},{"key":"ref1","first-page":"22","article-title":"Verfahren zum automatischen Generieren von Demontage-bzw. Montagesequenzen","author":"volkswagen","year":"2017","journal-title":"Prior art"},{"journal-title":"Hypergraph Models And Algorithms For The Assembly Problem","year":"1992","author":"gallo","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68552-4_24"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.07.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2001.905436"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.1110.0401"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/70.75905"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/70.54734"},{"key":"ref50","first-page":"1","article-title":"Distributed Graph-based Statistical Approach for Intrusion Detection in Cyber-Physical Systems","author":"sadreazami","year":"2017","journal-title":"IEEE Trans Signal Inf Process Over Netw"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/S0007-8506(07)61698-9"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1007\/s00170-003-1952-z","article-title":"A novel ant colony algorithm for assembly sequence planning","volume":"25","author":"wang","year":"2005","journal-title":"The International Journal of Advanced Manufacturing Technology"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.06.015"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.1995.525459"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.02.252"},{"key":"ref55","first-page":"361","article-title":"GrIDS - A Graph Based Intrusion Detection System For Large Networks","volume":"1","author":"staniford-chen","year":"1996","journal-title":"In Proceedings of the 19th National Information Systems Security Conference"},{"key":"ref54","first-page":"806","author":"smith","year":"2012","journal-title":"A New Graph-based Selective Disassembly Sequence Planning for Green Product Design"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1177\/0263276412451161"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7965981"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JRA.1987.1087132"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-642-02094-0_7","article-title":"Engineering Route Planning Algorithms","volume":"5515","author":"delling","year":"2009","journal-title":"Algorithmics of Large and Complex Networks"},{"key":"ref40","first-page":"1","article-title":"Event recommendation in social networks based on reverse random walk and participant scale control","author":"mo","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtrangeo.2017.04.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-48056-5_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2013.93"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/568574.568575"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16587-0_5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COASE.2016.7743489"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00289496"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of Scaling in Random Networks","volume":"286","author":"barab\u00e1si","year":"5439","journal-title":"Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/nrn2618"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00091"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/774841.774844"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.05.066"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289527"},{"key":"ref9","article-title":"Baeysian Mixed-Effects Models for Recommendation Systems","author":"keim condliff","year":"1999","journal-title":"ACM SIGIR Workshop Proceedings on Recommender Systems"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5194\/isprs-annals-IV-4-W5-99-2017"},{"key":"ref48","article-title":"Semantically enhanced network analysis for influencer identification in online social networks","author":"r\u00edos","year":"2017","journal-title":"Neurocomputing"},{"journal-title":"A assembly modeling method based on assembly feature GraphTree model","year":"2009","author":"qi","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.01.010"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CAIA.1993.366643"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.012582999"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2016.07.065"}],"event":{"name":"2018 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2018,11,18]]},"location":"Bangalore, India","end":{"date-parts":[[2018,11,21]]}},"container-title":["2018 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610062\/8628618\/08628683.pdf?arnumber=8628683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T01:16:25Z","timestamp":1598231785000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8628683\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/ssci.2018.8628683","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}