{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:26:41Z","timestamp":1743089201319,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319091648"},{"type":"electronic","value":"9783319091655"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09165-5_13","type":"book-chapter","created":{"date-parts":[[2014,7,11]],"date-time":"2014-07-11T13:56:50Z","timestamp":1405087010000},"page":"151-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Quantitative Study of $$2 \\times 4$$ Chinese Dark Chess"],"prefix":"10.1007","author":[{"given":"Hung-Jui","family":"Chang","sequence":"first","affiliation":[]},{"given":"Tsan-sheng","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,12]]},"reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.3233\/ICG-2010-33204","volume":"33","author":"B-N Chen","year":"2010","unstructured":"Chen, B.-N., Shen, B.-J., Hsu, T.-S.: Chinese dark chess. ICGA J. 33(2), 93\u2013106 (2010)","journal-title":"ICGA J."},{"key":"13_CR2","unstructured":"Chen, J.-C., Lin, T.-Y., Hsu, S.-C., Hsu, T.-s.: Design and implementation of computer chinese dark chess endgame database. In: Proceedings of TCGA Workshop, pp. 5\u20139 (2012)"},{"key":"13_CR3","unstructured":"Chen, J.-C., Lin, T.-Y., Hsu, T.-s.: Equivalence partition of dark chess endgames (submitted) (2013)"},{"key":"13_CR4","volume-title":"In: Fascicle 0: Introduction to Combinatorial Algorithms and Boolean Functions","author":"DE Knuth","year":"2008","unstructured":"Knuth, D.E.: The art of computer programming. In: Fascicle 0: Introduction to Combinatorial Algorithms and Boolean Functions, vol. 4, 1st edn. Addison-Wesley Professional, New York (2008)","edition":"1"},{"issue":"1","key":"13_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/0004-3702(85)90084-0","volume":"27","author":"RE Korf","year":"1985","unstructured":"Korf, R.E.: Depth-first iterative-deepening: an optimal admissible tree search. Artif. Intell. 27(1), 97\u2013109 (1985)","journal-title":"Artif. Intell."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Lin, C.-H., Shan, Y.-C., Wu, I-C.: Tournament framework for computer mahjong competitions. In: 2011 International Conference on Technologies and Applications of Artificial Intelligence (TAAI), pp. 286\u2013291. IEEE (2011)","DOI":"10.1109\/TAAI.2011.56"},{"issue":"4","key":"13_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1080\/01490409109513148","volume":"13","author":"D Scott","year":"1991","unstructured":"Scott, D.: The problematic nature of participation in contract bridge: a qualitative study of group-related constraints. Leis. Sci. 13(4), 321\u2013336 (1991)","journal-title":"Leis. Sci."},{"issue":"2","key":"13_CR8","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1162\/neco.1994.6.2.215","volume":"6","author":"G Tesauro","year":"1994","unstructured":"Tesauro, G.: TD-Gammon, a self-teaching backgammon program, achieves master-level play. Neural Comput. 6(2), 215\u2013219 (1994)","journal-title":"Neural Comput."},{"issue":"3","key":"13_CR9","first-page":"131","volume":"9","author":"K Thompson","year":"1986","unstructured":"Thompson, K.: Retrograde analysis of certain endgames. ICCA J. 9(3), 131\u2013139 (1986)","journal-title":"ICCA J."},{"key":"13_CR10","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-35452-6_25","volume-title":"Advances in Intelligent Systems and Applications - Volume 1","author":"S-J Yen","year":"2013","unstructured":"Yen, S.-J., Chou, C.-W., Chen, J.-C., Wu, I.-C., Kao, K.-Y.: The art of the Chinese dark chess program diable. In: Chang, R.-S., Jain, L.C., Peng, S.-L. (eds.) Advances in Intelligent Systems and Applications - Volume 1. Smart Innovation, Systems and Technologies, vol. 20, pp. 231\u2013242. Springer, Berlin Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Computers and Games"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09165-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T01:11:01Z","timestamp":1674263461000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09165-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319091648","9783319091655"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09165-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"12 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}