{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:57:17Z","timestamp":1743141437036,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319091648"},{"type":"electronic","value":"9783319091655"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09165-5_4","type":"book-chapter","created":{"date-parts":[[2014,7,11]],"date-time":"2014-07-11T13:56:50Z","timestamp":1405087010000},"page":"39-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Investigating the Limits of Monte-Carlo Tree Search Methods in Computer Go"],"prefix":"10.1007","author":[{"given":"Shih-Chieh","family":"Huang","sequence":"first","affiliation":[]},{"given":"Martin","family":"M\u00fcller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,12]]},"reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCIAIG.2012.2186810","volume":"4","author":"C Browne","year":"2012","unstructured":"Browne, C., Powley, E., Whitehouse, D., Lucas, S., Cowling, P., Rohlfshagen, P., Tavener, S., Perez, D., Samothrakis, S., Colton, S.: A survey of Monte Carlo tree search methods. IEEE Trans. Comput. Intell. AI Games 4(1), 1\u201343 (2012)","journal-title":"IEEE Trans. Comput. Intell. AI Games"},{"key":"4_CR2","unstructured":"Coquelin, P.-A., Munos, R.: Bandit algorithms for tree search. In: Parr, R., van der Gaag, L. (eds.) UAI, pp. 67\u201374. AUAI Press (2007)"},{"key":"4_CR3","unstructured":"Gelly, S.: A contribution to reinforcement learning; application to computer-Go. Ph.D. thesis, Universit\u00e9 Paris-Sud (2007)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Gelly, S., Silver, D.: Combining online and offline knowledge in UCT. In: ICML \u201907: Proceedings of the 24th International Conference on Machine Learning, pp. 273\u2013280. ACM (2007)","DOI":"10.1145\/1273496.1273531"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-17928-0_8","volume-title":"Computers and Games","author":"S-C Huang","year":"2011","unstructured":"Huang, S.-C., Coulom, R., Lin, S.-S.: Monte-Carlo simulation balancing in practice. In: van den Herik, H.J., Iida, H., Plaat, A. (eds.) CG 2010. LNCS, vol. 6515, pp. 81\u201392. Springer, Heidelberg (2011)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1007\/11871842_29","volume-title":"Machine Learning: ECML 2006","author":"L Kocsis","year":"2006","unstructured":"Kocsis, L., Szepesv\u00e1ri, C.: Bandit based Monte-Carlo planning. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol. 4212, pp. 282\u2013293. Springer, Heidelberg (2006)"},{"key":"4_CR7","unstructured":"M\u00fcller, M.: Fuego-GB Prototype at the human machine competition in Barcelona 2010: a tournament report and analysis. Technical report TR 10\u201308, Dept. of Computing Science. University of Alberta, Edmonton, Alberta, Canada (2010). https:\/\/www.cs.ualberta.ca\/research\/theses-publications\/technical-reports\/2010\/TR10-08"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Ramanujan, R., Selman, B.: Trade-offs in sampling-based adversarial planning. In: Bacchus, F., Domshlak, C., Edelkamp, S., Helmert, M. (eds.) ICAPS, pp. 202\u2013209. AAAI (2011)","DOI":"10.1609\/icaps.v21i1.13472"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TCIAIG.2010.2098876","volume":"2","author":"A Rimmel","year":"2010","unstructured":"Rimmel, A., Teytaud, O., Lee, C.-S., Yen, S.-J., Wang, M.-H., Tsai, S.-R.: Current frontiers in computer Go. IEEE Trans. Comput. Intell. AI Games 2(4), 229\u2013238 (2010). (Special issue on Monte-Carlo Techniques and Computer Go)","journal-title":"IEEE Trans. Comput. Intell. AI Games"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Silver, D., Tesauro, G.: Monte-Carlo simulation balancing. In: Danyluk, A., Bottou, L., Littman, M. (eds.) ICML. ACM International Conference Proceeding Series. vol. 382, pp. 945\u2013952. ACM (2009)","DOI":"10.1145\/1553374.1553495"}],"container-title":["Lecture Notes in Computer Science","Computers and Games"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09165-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T05:35:31Z","timestamp":1676871331000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09165-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319091648","9783319091655"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09165-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"12 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}