{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:56:32Z","timestamp":1769208992660,"version":"3.49.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/tsmcb.2012.2218805","type":"journal-article","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:39:49Z","timestamp":1350607189000},"page":"948-956","source":"Crossref","is-referenced-by-count":57,"title":["Towards a Snowdrift Game Optimization to Vertex Cover of Networks"],"prefix":"10.1109","volume":"43","author":[{"family":"Yang Yang","sequence":"first","affiliation":[]},{"family":"Xiang Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/2951778"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2027220"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.918570"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1000758"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TSMCB.2009.2035929","article-title":"Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs","volume":"40","author":"li","year":"2010","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1126\/science.1133755"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2035100"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.plrev.2009.08.001"},{"key":"ref35","author":"young","year":"2001","journal-title":"Individual Strategy and Social Structure An Evolutionary Theory of Institutions"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.36.1.48"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11944874_17"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.056113"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/moor.24.3.751"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10841-9_18"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2010.02.005"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1109\/TC.2003.1204831","article-title":"Coverage in wireless ad hoc sensor networks","volume":"52","author":"li","year":"2003","journal-title":"IEEE Trans Comput"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TSMCB.2010.2042593","article-title":"Game-theoretic approach for improving cooperation in wireless multihop networks","volume":"40","author":"ng","year":"2010","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2040733"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2007.370690"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/nature07921"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2007.0793"},{"key":"ref4","first-page":"86","article-title":"An evolutionary heuristic for the minimum vertex cover problem","author":"khuri","year":"1994","journal-title":"Proc Genetic Algorithms Framework Evol Comput"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/359826a0"},{"key":"ref3","author":"papadimitriou","year":"1998","journal-title":"Combinatorial Optimization Algorithms and Complexity"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"ref6","first-page":"90","article-title":"New hybrid genetic algorithm for vertex cover problems","volume":"14","author":"huo","year":"2003","journal-title":"J Syst Eng Electron"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.098104"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4631000"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2009.2014362"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/12.481492"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00290149"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/0211045"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77105-0_52"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/nature02360"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","article-title":"On random graphs","volume":"6","author":"erd\ufffds","year":"1959","journal-title":"Publ Math Debrecen"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.875423"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AP2PS.2009.13"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2011.6031982"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2009.10.003"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.046110"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2007.04.004"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.4633"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/3477.485836"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"barab\ufffdsi","year":"1999","journal-title":"Science"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"997","DOI":"10.1109\/TSMCB.2003.818557","article-title":"A hybrid of genetic algorithm and particle swarm optimization for recurrent network design","volume":"34","author":"juang","year":"2004","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/30918"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6221036\/6515342\/06334484.pdf?arnumber=6334484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T08:43:05Z","timestamp":1687768985000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6334484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":46,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsmcb.2012.2218805","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}