{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T20:14:50Z","timestamp":1774988090512,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,7,6]],"date-time":"2013-07-06T00:00:00Z","timestamp":1373068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,7,6]]},"DOI":"10.1145\/2464576.2464681","type":"proceedings-article","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T13:26:51Z","timestamp":1374672411000},"page":"203-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Self-focusing genetic programming for software optimisation"],"prefix":"10.1145","author":[{"given":"Brendan","family":"Cody-Kenny","sequence":"first","affiliation":[{"name":"Trinity College Dublin, Dublin, Ireland"}]},{"given":"Stephen","family":"Barrett","sequence":"additional","affiliation":[{"name":"Trinity College Dublin, Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2013,7,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Two self-adaptive crossover operations for genetic programming","author":"Angeline P.","year":"1995","unstructured":"P. Angeline . Two self-adaptive crossover operations for genetic programming . 1995 . P. Angeline. Two self-adaptive crossover operations for genetic programming. 1995."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-7782-3_11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068207"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 3rd International Workshop on Bytecode Semantics, Verification, Analysis and Transformation","author":"Kuperberg M.","year":"2008","unstructured":"M. Kuperberg , M. Krogmann , and R. Reussner . ByCounter: Portable Runtime Counting of Bytecode Instructions and Method Invocations . In Proceedings of the 3rd International Workshop on Bytecode Semantics, Verification, Analysis and Transformation , Budapest, Hungary, 5th April 2008 (ETAPS 2008, 11th European Joint Conferences on Theory and Practice of Software), 2008. M. Kuperberg, M. Krogmann, and R. Reussner. ByCounter: Portable Runtime Counting of Bytecode Instructions and Method Invocations. In Proceedings of the 3rd International Workshop on Bytecode Semantics, Verification, Analysis and Transformation , Budapest, Hungary, 5th April 2008 (ETAPS 2008, 11th European Joint Conferences on Theory and Practice of Software), 2008."},{"key":"e_1_3_2_1_5_1","volume-title":"Department of Computer Science","author":"Langdon W. B.","year":"2012","unstructured":"W. B. Langdon and M. Harman . Genetically improving 50000 lines of C++ Research Note RN\/12\/09 , Department of Computer Science , University College London , Gower Street , London WC1E 6BT, UK, 19 Sept. 2012 . W. B. Langdon and M. Harman. Genetically improving 50000 lines of C++ Research Note RN\/12\/09, Department of Computer Science, University College London, Gower Street, London WC1E 6BT, UK, 19 Sept. 2012."},{"key":"e_1_3_2_1_6_1","unstructured":"The Eclipse Foundation. Java development tools. http:\/\/www.eclipse.org\/jdt\/ Nov. 2012.  The Eclipse Foundation. Java development tools. http:\/\/www.eclipse.org\/jdt\/ Nov. 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735249"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2083669"}],"event":{"name":"GECCO '13: Genetic and Evolutionary Computation Conference","location":"Amsterdam The Netherlands","acronym":"GECCO '13","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"]},"container-title":["Proceedings of the 15th annual conference companion on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2464576.2464681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2464576.2464681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:12Z","timestamp":1750235952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2464576.2464681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,6]]},"references-count":8,"alternative-id":["10.1145\/2464576.2464681","10.1145\/2464576"],"URL":"https:\/\/doi.org\/10.1145\/2464576.2464681","relation":{},"subject":[],"published":{"date-parts":[[2013,7,6]]},"assertion":[{"value":"2013-07-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}