{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T21:33:11Z","timestamp":1759959191003},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2010,4,1]],"date-time":"2010-04-01T00:00:00Z","timestamp":1270080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Evol. Computat."],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1109\/tevc.2009.2028330","type":"journal-article","created":{"date-parts":[[2009,11,3]],"date-time":"2009-11-03T18:36:54Z","timestamp":1257273414000},"page":"206-226","source":"Crossref","is-referenced-by-count":24,"title":["Nonlinear Network Optimization\u2014An Embedding Vector Space Approach"],"prefix":"10.1109","volume":"14","author":[{"given":"Eduardo G","family":"Carrano","sequence":"first","affiliation":[]},{"given":"Ricardo H C","family":"Takahashi","sequence":"additional","affiliation":[]},{"given":"Carlos M","family":"Fonseca","sequence":"additional","affiliation":[]},{"given":"Oriane M","family":"Neto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(91)90023-X"},{"key":"ref38","first-page":"206","author":"garey","year":"1979","journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/315891.316009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015527207828"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(02)00051-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8667.00309"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2006.871250"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/0203015"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937505"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1017\/S0963548304006650"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/4235.942526"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/326619.326733"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(02)00029-1"},{"key":"ref2","first-page":"168","author":"luenberger","year":"1984","journal-title":"Linear and Nonlinear Programming"},{"key":"ref1","first-page":"11","author":"luenberger","year":"1969","journal-title":"Optimization by vector space methods"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BF02614311"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/S0142-0615(02)00079-0","article-title":"multi-objective transmission network system planning by hybrid ga approach with fuzzy decision analysis","volume":"25","author":"chung","year":"2003","journal-title":"Int J Elec Power Energy Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/59.667402"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70928-2_38"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/ip-gtd:20050036"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7796(02)00041-X"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7796(00)00102-4"},{"key":"ref50","first-page":"742","article-title":"neuer beweis eines satzes ber permutationen","volume":"27","author":"prfer","year":"1918","journal-title":"Arch Math Phys"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1162\/106365602317301781"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2007.894847"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718812"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719857"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144504446096"},{"key":"ref55","first-page":"141","article-title":"on the quadratic minimum spanning tree problem","author":"xu","year":"1995","journal-title":"Proc 7th Int Conf Genetic Algorithms"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/1520-6750(199204)39:3<399::AID-NAV3220390309>3.0.CO;2-0"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-22199-0_2"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139164849"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2005.09.013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2003.06.037"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3828.3830"},{"key":"ref12","first-page":"1","article-title":"two topologies for discrete space","author":"galton","year":"1999","journal-title":"Proc Workshop on Spatial Reasoning"},{"key":"ref13","first-page":"26","article-title":"continuous motion in discrete spaces","author":"galton","year":"2000","journal-title":"Proc Int l Conf Principles of Knowledge Representation and Reasoning"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1006\/aama.2001.0759"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/67.475954"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11269-006-4635-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11081-007-9018-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.08.066"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(00)00088-5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1997.592326"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03315-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.1999.785514"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7796(01)00191-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(98)00385-3"},{"key":"ref49","first-page":"171","author":"rothlauf","year":"2005","journal-title":"Representations for Genetic and Evolutionary Algorithms"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2005.858779"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2307\/2033241"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2003.810505"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.825867"},{"key":"ref47","first-page":"14","article-title":"reducing bias and inefficiency in the selection algorithm","author":"baker","year":"1987","journal-title":"Proc 7th Int Conf Genetic Algorithms"},{"key":"ref42","first-page":"379","article-title":"representing trees in genetic algorithms","volume":"1","author":"palmer","year":"1994","journal-title":"Proc 1st IEEE Int Conf Evol Comput"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2007.4414042"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2003.810371"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.807275"}],"container-title":["IEEE Transactions on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4235\/5438925\/05299259.pdf?arnumber=5299259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:59:35Z","timestamp":1633910375000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5299259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":59,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tevc.2009.2028330","relation":{},"ISSN":["1941-0026","1089-778X"],"issn-type":[{"value":"1941-0026","type":"electronic"},{"value":"1089-778X","type":"print"}],"subject":[],"published":{"date-parts":[[2010,4]]}}}