{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:00Z","timestamp":1763468280311,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T00:00:00Z","timestamp":1468195200000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006234","name":"Sandia National Laboratories, National Nuclear Security Administration","doi-asserted-by":"publisher","award":["PO 1498184"],"award-info":[{"award-number":["PO 1498184"]}],"id":[{"id":"10.13039\/100006234","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,7,11]]},"DOI":"10.1145\/2739482.2768457","type":"proceedings-article","created":{"date-parts":[[2015,7,10]],"date-time":"2015-07-10T10:10:55Z","timestamp":1436523055000},"page":"1051-1058","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Hyper-Heuristics"],"prefix":"10.1145","author":[{"given":"Rebecca","family":"Rivers","sequence":"first","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO, USA"}]},{"given":"Daniel R.","family":"Tauritz","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, R, MO, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01799-5_6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-009-9081-6"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1274000.1274008"},{"issue":"3","key":"e_1_3_2_1_4_1","first-page":"447","article-title":"Diagonal Crossover","volume":"26","author":"Eiben A. E.","year":"1997","unstructured":"A. E. Eiben and C. H. van Kemenade. Diagonal Crossover in Genetic Algorithms for Numerical Optimization. Journal of Control and Cybernetics, 26(3):447--465, 1997.","journal-title":"Journal of Control and Cybernetics"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330784.2330795"},{"key":"e_1_3_2_1_6_1","volume-title":"The NK model of rugged fitness landscapes and its application to maturation of the immune response. Journal of theoretical biology, 141(2):211--245","author":"Kauffman S. A.","year":"1989","unstructured":"S. A. Kauffman and E. D. Weinberger. The NK model of rugged fitness landscapes and its application to maturation of the immune response. Journal of theoretical biology, 141(2):211--245, 1989."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330784.2330794"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463372.2463558"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.12.012"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2764718"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464576.2482728"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598394.2609872"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598394.2598448"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32964-7_41"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1162\/1063656054794815"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39432-7_70"},{"key":"e_1_3_2_1_17_1","volume-title":"An empirical study of hyperheuristics for managing very large sets of low level heuristics. Journal of the operational research society, 63(3):392--405","author":"Remde S.","year":"2012","unstructured":"S. Remde, P. Cowling, K. Dahal, N. Colledge, and E. Selensky. An empirical study of hyperheuristics for managing very large sets of low level heuristics. Journal of the operational research society, 63(3):392--405, 2012."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1689599.1689651"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.03.046"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10100-013-0321-8"}],"event":{"name":"GECCO '15: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Madrid Spain","acronym":"GECCO '15"},"container-title":["Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2739482.2768457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2739482.2768457","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2739482.2768457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:39:28Z","timestamp":1763458768000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2739482.2768457"}},"subtitle":["A Study On Increasing Primitive-Space"],"short-title":[],"issued":{"date-parts":[[2015,7,11]]},"references-count":20,"alternative-id":["10.1145\/2739482.2768457","10.1145\/2739482"],"URL":"https:\/\/doi.org\/10.1145\/2739482.2768457","relation":{},"subject":[],"published":{"date-parts":[[2015,7,11]]},"assertion":[{"value":"2015-07-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}