{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:52Z","timestamp":1750306672854,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,12]],"date-time":"2014-07-12T00:00:00Z","timestamp":1405123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,12]]},"DOI":"10.1145\/2576768.2598331","type":"proceedings-article","created":{"date-parts":[[2014,7,11]],"date-time":"2014-07-11T12:10:42Z","timestamp":1405080642000},"page":"129-136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A generic finite automata based approach to implementing lymphocyte repertoire models"],"prefix":"10.1145","author":[{"given":"Johannes","family":"Textor","sequence":"first","affiliation":[{"name":"Universiteit Utrecht, Utrecht, Netherlands"}]},{"given":"Katharina","family":"Dannenberg","sequence":"additional","affiliation":[{"name":"Universit\u00e4t zu L\u00fcbeck, L\u00fcbeck, Germany"}]},{"given":"Macie","family":"Li\u015bkiewicz","sequence":"additional","affiliation":[{"name":"Universit\u00e4t zu L\u00fcbeck, L\u00fcbeck, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,7,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1045","volume-title":"Proc. of GECCO 2002","author":"Balthrop J.","year":"2002","unstructured":"J. Balthrop , F. Esponda , S. Forrest , and M. R. Glickman . Coverage and generalization in an artificial immune system . In Proc. of GECCO 2002 , pages 1045 -- 1050 , 2002 . J. Balthrop, F. Esponda, S. Forrest, and M. R. Glickman. Coverage and generalization in an artificial immune system. In Proc. of GECCO 2002, pages 1045--1050, 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-010-9446-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1222467110"},{"key":"e_1_3_2_1_4_1","volume-title":"Degenerate T-cell recognition of peptides on MHC molecules creates large holes in the T-cell repertoire. PLoS Comp Biol, 8(3)","author":"Calis J. J. A.","year":"2012","unstructured":"J. J. A. Calis , R. J. D. Boer , and C. Kesmir . Degenerate T-cell recognition of peptides on MHC molecules creates large holes in the T-cell repertoire. PLoS Comp Biol, 8(3) , 2012 . J. J. A. Calis, R. J. D. Boer, and C. Kesmir. Degenerate T-cell recognition of peptides on MHC molecules creates large holes in the T-cell repertoire. PLoS Comp Biol, 8(3), 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2003.12.011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/eji.200535098"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkq1020"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2010.09.022"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/262793.262811"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/882490.884218"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00251-008-0341-z"},{"key":"e_1_3_2_1_12_1","volume-title":"Pearson\/Addison Wesley","author":"Hopcroft J. E.","year":"2007","unstructured":"J. E. Hopcroft , R. Motwani , and J. D. Ullman . Introduction to automata theory, languages, and computation . Pearson\/Addison Wesley , 2007 . J. E. Hopcroft, R. Motwani, and J. D. Ullman. Introduction to automata theory, languages, and computation. Pearson\/Addison Wesley, 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2007.15.2.223"},{"key":"e_1_3_2_1_14_1","first-page":"551","volume-title":"Proc. of SODA 1995","author":"Kannan S.","year":"1995","unstructured":"S. Kannan , Z. Sweedyk , and S. Mahaney . Counting and random generation of strings in regular languages . In Proc. of SODA 1995 , pages 551 -- 557 , 1995 . S. Kannan, Z. Sweedyk, and S. Mahaney. Counting and random generation of strings in regular languages. In Proc. of SODA 1995, pages 551--557, 1995."},{"key":"e_1_3_2_1_15_1","first-page":"1330","volume-title":"Proc. of GECCO 2001","author":"Kim J.","year":"2001","unstructured":"J. Kim and P. J. Bentley . An evaluation of negative selection in an artificial immune system for network intrusion detection . In Proc. of GECCO 2001 , pages 1330 -- 1337 . Morgan Kaufmann , 2001 . J. Kim and P. J. Bentley. An evaluation of negative selection in an artificial immune system for network intrusion detection. In Proc. of GECCO 2001, pages 1330--1337. Morgan Kaufmann, 2001."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-10-394"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0808081105"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature08997"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.16"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0890-5401(03)00057-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1830483.1830673"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1121561"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.90.5.1691"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-5193(79)90275-3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(92)90142-3"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1006\/bulm.1997.0035"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-008-9097-5"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068061"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33757-4_3"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32937-1_4"}],"event":{"name":"GECCO '14: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Vancouver BC Canada","acronym":"GECCO '14"},"container-title":["Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2576768.2598331","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2576768.2598331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:54Z","timestamp":1750230054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2576768.2598331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,12]]},"references-count":30,"alternative-id":["10.1145\/2576768.2598331","10.1145\/2576768"],"URL":"https:\/\/doi.org\/10.1145\/2576768.2598331","relation":{},"subject":[],"published":{"date-parts":[[2014,7,12]]},"assertion":[{"value":"2014-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}