{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:03:48Z","timestamp":1729652628873,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cec.2017.7969419","type":"proceedings-article","created":{"date-parts":[[2017,7,7]],"date-time":"2017-07-07T14:26:43Z","timestamp":1499437603000},"page":"1015-1020","source":"Crossref","is-referenced-by-count":0,"title":["Similarities and sensitivity: Immune and ant algorithms applied towards robotics"],"prefix":"10.1109","author":[{"given":"Camelia-M.","family":"Pintea","sequence":"first","affiliation":[]},{"given":"Simone A.","family":"Ludwig","sequence":"additional","affiliation":[]},{"given":"Petrica C.","family":"Pop","sequence":"additional","affiliation":[]},{"given":"Oliviu","family":"Matei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59901-9_10"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.09.057"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11721-017-0132-y"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(97)00142-2"},{"key":"ref36","first-page":"266","volume":"5132","author":"whitbrook","year":"2008","journal-title":"An Idiotypic Immune Network as a Short-Term Learning Architecture for Mobile Robots"},{"key":"ref35","first-page":"122","article-title":"The transfer of evolved artificial immune system behaviours between small and large scale robotic platforms","author":"whitbrook","year":"2009","journal-title":"Proc EA'09"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.907334"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-28356-0_13"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2016.7831958"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(86)90240-X"},{"journal-title":"FIPA Communicative Act Library Specification","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(84)90182-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2006.12.004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11370-017-0217-x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45507-5_6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26561-2_71"},{"key":"ref19","first-page":"373","article-title":"Towards a network theory of the immune system","volume":"125 c","author":"jerne","year":"1974","journal-title":"Ann d'Immun"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.08.050"},{"key":"ref4","first-page":"144","volume":"6209","author":"cutello","year":"2010","journal-title":"An information-theoretic approach for clonal selection algorithms"},{"key":"ref27","first-page":"92","article-title":"Denial Jamming Attack on Wireless Sensor Network using Sensitive Agents","volume":"24","author":"pintea","year":"2016","journal-title":"Logic J IGPL"},{"journal-title":"Artificial Immune Systems A New Computational Intelligence Approach","year":"2002","author":"castro","key":"ref3"},{"journal-title":"Ant Colony Optimization","year":"2004","author":"dorigo","key":"ref6","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1290.001.0001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2015.7257268"},{"journal-title":"Immunological Computation Theory and Applications","year":"2009","author":"dasgupta","key":"ref5"},{"journal-title":"TR","article-title":"Distributed Collective Building of Two-Dimensional Structures Using Autonomous Robots","year":"2001","author":"easton","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585892"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5962\/bhl.title.8281"},{"journal-title":"Bio-Inspired Artificial Intelligence Theories Methods and Technologies","year":"2008","author":"floreano","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.169.3950.1042"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1126\/science.1071059"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77566-9_48"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40179-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299565"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33018-6_5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01854-6_42"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1006\/jnca.1996.0014"}],"event":{"name":"2017 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2017,6,5]]},"location":"Donostia, San Sebasti\u00e1n, Spain","end":{"date-parts":[[2017,6,8]]}},"container-title":["2017 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7959755\/7969277\/07969419.pdf?arnumber=7969419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T20:39:19Z","timestamp":1569703159000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7969419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":36,"URL":"http:\/\/dx.doi.org\/10.1109\/cec.2017.7969419","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}