{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:37:16Z","timestamp":1729669036175,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/cis.2016.0117","type":"proceedings-article","created":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T02:17:31Z","timestamp":1484878651000},"page":"483-486","source":"Crossref","is-referenced-by-count":0,"title":["One Method of Cloth Simulation Based on Adaptive Meshes"],"prefix":"10.1109","author":[{"given":"Huijian","family":"Han","sequence":"first","affiliation":[]},{"given":"Luyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2003.1260747"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2010.01811.x"},{"key":"ref6","first-page":"103","article-title":"Sqrt(3)-Subdivision?A?","volume":"18","author":"kobbelt","year":"2000","journal-title":"Proc Siggraph"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2185520.2185592"},{"key":"ref8","first-page":"429","article-title":"Adapting Particle Swarm Optimization to Dynamic Environments?A?","author":"carlisle","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05105-4_2"},{"key":"ref2","first-page":"43","article-title":"Large Steps in Cloth Simulations?A?","author":"baraff","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-7486-9_3"}],"event":{"name":"2016 12th International Conference on Computational Intelligence and Security (CIS)","start":{"date-parts":[[2016,12,16]]},"location":"Wuxi, China","end":{"date-parts":[[2016,12,19]]}},"container-title":["2016 12th International Conference on Computational Intelligence and Security (CIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7819579\/7820391\/07820508.pdf?arnumber=7820508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:45:37Z","timestamp":1507002337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7820508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/cis.2016.0117","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}