{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:59:41Z","timestamp":1730213981267,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/dasc-picom-datacom-cyberscitec.2016.86","type":"proceedings-article","created":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T21:33:46Z","timestamp":1476394426000},"page":"432-436","source":"Crossref","is-referenced-by-count":2,"title":["Tolerance-Based Group Scoring Scheme Promotes Cooperation in Public Goods Game"],"prefix":"10.1109","author":[{"given":"Haiping","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongjun","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Weitong","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Lanping","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Darwinism and human affairs","year":"1979","author":"alexander","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5193(03)00246-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/nature04131"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/g6040438"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2003.2336"},{"key":"ref15","article-title":"Reputation-based partner choice promotes cooperation in social networks","volume":"78","author":"feng","year":"2008","journal-title":"Physical Review E Statistical Nonlinear & Soft Matter Physics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2013.07.019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/srep07843"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/31225"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/327015a0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2008.09.015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/2296617"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.1133755"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1206694109"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2009.1171"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/355250a0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1126\/science.7466396"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1086\/406755"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/364056a0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0899-8256(05)80020-X"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0407370102"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0108423"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2005.3072"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/nature06940"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.118101"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1118\/1.598163"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/srep12145"}],"event":{"name":"2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech)2016","start":{"date-parts":[[2016,8,8]]},"location":"Auckland","end":{"date-parts":[[2016,8,12]]}},"container-title":["2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7585853\/7588794\/07588882.pdf?arnumber=7588882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T03:16:55Z","timestamp":1556248615000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7588882\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/dasc-picom-datacom-cyberscitec.2016.86","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}