{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:52:36Z","timestamp":1740178356250,"version":"3.37.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/tetci.2019.2951813","type":"journal-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T21:05:41Z","timestamp":1574456741000},"page":"351-368","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Search and Lookup in Unstructured P2P Overlay Networks Inspired by Swarm Intelligence"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0759-0686","authenticated-orcid":false,"given":"Vesna","family":"Sesum-Cavic","sequence":"first","affiliation":[]},{"given":"Eva","family":"Kuhn","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8959-6298","authenticated-orcid":false,"given":"Lukas","family":"Fleischhacker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Self-Organization in Biological Systems","year":"2001","author":"camazine","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/71.862209"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1041680.1041681"},{"journal-title":"P2P Networking and Applications","year":"2008","author":"lua","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2010.5497621"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09655-1_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.7551\/978-0-262-31709-2-ch092"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.29"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19542-6_127"},{"key":"ref17","first-page":"1028","article-title":"A swarm intelligence appliance to the construction of an intelligent peer-to-peer overlay network","author":"\u0161e\u0161um-?avi?","year":"0","journal-title":"Proc IEEE Int Conf Complex Intell Softw Intensive Syst"},{"key":"ref18","first-page":"429","article-title":"Antsearch: An ant search algorithm in unstructured peer-to-peer networks","author":"wu","year":"0","journal-title":"Proc 11th IEEE Symp Comput Commun"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IITA.2008.174"},{"key":"ref28","first-page":"84","article-title":"Search and replication in unstructured peer-to-peer networks","author":"lv","year":"0","journal-title":"Proc 16th Int Conf Supercomput"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/IJSIR.2018070102"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.orp.2016.09.002","article-title":"The irace package: Iterated racing for automatic algorithm configuration","volume":"3","author":"l\u00f3pez-ib\u00e1\u00f1ez","year":"2011","journal-title":"Perspectives on Operations Research"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.swevo.2016.03.002","article-title":"Bio-inspired search algorithms for unstructured P2P overlay networks","volume":"29","author":"\u0161e\u0161um-?avi?","year":"2016","journal-title":"Swarm Evol Comput"},{"key":"ref6","first-page":"84","article-title":"Search and replication in unstructured peer-to-peer networks","author":"lv","year":"0","journal-title":"Proc 16th Int Conf Supercomput"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1290.001.0001"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-1-4419-1665-5_8","article-title":"Ant Colony Optimization: Overview and Recent Advances","author":"dorigo","year":"2010","journal-title":"Handbook of Metaheuristics"},{"key":"ref8","first-page":"63","author":"sauvard","year":"2004","journal-title":"General Biology of Bark Beetles"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2018.04.007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38493-6_9"},{"key":"ref9","article-title":"Insights into information processing by the single cell slime mold Physarum polycephalum","author":"hickey","year":"0","journal-title":"Proc UKACC Control Conf"},{"journal-title":"Learning Akka","year":"2015","author":"goodwin","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498436"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069402"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2016.12.005"},{"key":"ref24","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"key":"ref23","first-page":"404","article-title":"Algorithms and framework for comparison of bee-intelligence based peer-to-peer lookup","author":"\u0161e\u0161um-?avi?","year":"0","journal-title":"Proc 4th Int Conf Adv Swarm Intell"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74917-2_13"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"barab\u00e1si","year":"1999","journal-title":"Science"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7433297\/9099327\/08910415.pdf?arnumber=8910415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T12:49:27Z","timestamp":1651063767000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8910415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":31,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2019.2951813","relation":{},"ISSN":["2471-285X"],"issn-type":[{"type":"electronic","value":"2471-285X"}],"subject":[],"published":{"date-parts":[[2020,6]]}}}