{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:58:55Z","timestamp":1743019135489,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_14","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"139-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons"],"prefix":"10.1007","author":[{"given":"Hikari","family":"Kato","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Szil\u00e1rd Zsolt","family":"Fazekas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mayumi","family":"Takaya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Akihiro","family":"Yamamura","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"14_CR1","unstructured":"Allis, L.V.: Searching for Solutions in games and Artificial Intelligence. Ph.D. thesis, Maastricht, Rrijksuniversiteit Limburg (1995)"},{"issue":"2\u20133","key":"14_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learning 47(2\u20133), 235\u2013256 (2002)","journal-title":"Mach. Learning"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-540-40031-8_9","volume-title":"Computers and Games","author":"H Avetisyan","year":"2003","unstructured":"Avetisyan, H., Lorentz, R.J.: Selective search in an Amazons program. In: Schaeffer, J., M\u00fcller, M., Bj\u00f6rnsson, Y. (eds.) CG 2002. LNCS, vol. 2883, pp. 123\u2013141. Springer, Heidelberg (2003)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Berlekamp, E.R.: Sums of \n                      \n                        \n                      \n                      $$N \\times 2$$\n                     Amazons. Institute of Mathematical Statistics Lecture Notes - Monograph Series, vol. 35 (2000)","DOI":"10.1214\/lnms\/1215089741"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-45579-5_17","volume-title":"Computers and Games","author":"M Buro","year":"2002","unstructured":"Buro, M.: Simple Amazons endgames and their connection to Hamilton circuits in cubic subgrid graphs. In: Marsland, T., Frank, I. (eds.) CG 2001. LNCS, vol. 2063, pp. 250\u2013261. Springer, Heidelberg (2002)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-75538-8_7","volume-title":"Computers and Games","author":"R Coulom","year":"2007","unstructured":"Coulom, R.: Efficient selectivity and backup operators in Monte-Carlo tree search. In: van den Herik, H.J., Ciancarini, P., Donkers, H.H.L.M.J. (eds.) CG 2006. LNCS, vol. 4630, pp. 72\u201383. Springer, Heidelberg (2007)"},{"key":"14_CR7","doi-asserted-by":"crossref","first-page":"198","DOI":"10.3233\/ICG-2007-30403","volume":"30","author":"R Coulom","year":"2007","unstructured":"Coulom, R.: Computing Elo ratings of move patterns in the game of Go. ICGA J. 30, 198\u2013208 (2007)","journal-title":"ICGA J."},{"key":"14_CR8","unstructured":"Gelly, S., Wang, Y., Munos, R., Teytaud, O.: Modification of UCT with patterns in Monte-Carlo Go. Technical Report PR-6062, INRIA (2006)"},{"key":"14_CR9","unstructured":"Hensgens, P.: A Knowledge-based Approach of the Game of Amazons. Master\u2019s thesis, Maastricht University (2001)"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.entcom.2011.11.003","volume":"3","author":"K Hoki","year":"2012","unstructured":"Hoki, K., Muramatsu, M.: Efficiency of three forward-pruning techniques in Shogi: futility pruning, null-move pruning, and late move reduction (LMR). Entertainment Comput. 3, 51\u201357 (2012)","journal-title":"Entertainment Comput."},{"key":"14_CR11","first-page":"75","volume":"27","author":"T Kaneko","year":"2012","unstructured":"Kaneko, T.: Evaluation functions of computer Shogi programs and supervised learning using game records. J. Jpn. Soc. Artif. Intell. 27, 75\u201382 (2012)","journal-title":"J. Jpn. Soc. Artif. Intell."},{"key":"14_CR12","unstructured":"Kloetzer, J., Iida, H., Bouzy, B.: The Monte-Carlo approach in Amazons. In: Computer Games Workshop, pp. 185\u2013192, Amsterdam, The Netherlands (2007)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Kloetzer, J., Iida, H., Bouzy, B.: A comparative study of solvers in Amazons endgames. In: IEEE 2008 Symposium on Computational Intelligence in Games, Perth, Australia (2008)","DOI":"10.1109\/CIG.2008.5035665"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"140","DOI":"10.3233\/ICG-2009-32303","volume":"32","author":"J Kloetzer","year":"2009","unstructured":"Kloetzer, J., Iida, H., Bouzy, B.: Playing Amazons endgames. ICGA J. 32, 140\u2013148 (2009)","journal-title":"ICGA J."},{"key":"14_CR15","unstructured":"Kloetzer, J.: Experiments in Monte-Carlo Amazons. IPSJ SIG Technical Report, vol. 2010-GI-24 No. 6, pp. 1\u20134 (2010)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Kloetzer, J.: Monte-Carlo opening books for Amazons. In: 7th Conference on Computer and Games (2010)","DOI":"10.1007\/978-3-642-17928-0_12"},{"key":"14_CR17","unstructured":"Kloetzer, J.: Monte-Carlo techniques: application to Monte Carlo tree search and Amazon (2011). \n                      http:\/\/hdl.handle.net\/10119\/8867"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/0004-3702(75)90019-3","volume":"6","author":"D Knuth","year":"1975","unstructured":"Knuth, D., Moore, R.: An analysis of alpha-beta pruning. Artif. Intell. 6, 293\u2013326 (1975)","journal-title":"Artif. Intell."},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Kocsis, L., Szepesv\u00e1ri, C.: Bandit based Monte Carlo planning. In: 17th European Conference on Machine Learning (ECML 2006), pp. 282\u2013293 (2006)","DOI":"10.1007\/11871842_29"},{"key":"14_CR20","unstructured":"Kozelek, T.: Methods of MCTS and the game Arimaa. Master\u2019s thesis, Charles University in Prague (2009)"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.tcs.2005.09.048","volume":"349","author":"J Lieberum","year":"2005","unstructured":"Lieberum, J.: An evaluation function for the game of Amazons. Theoret. Comput. Sci. 349, 230\u2013244 (2005)","journal-title":"Theoret. Comput. Sci."},{"key":"14_CR22","first-page":"103","volume":"19","author":"H Matsubara","year":"1996","unstructured":"Matsubara, H., Iida, H., Grimbergen, R.: Chess, Shogi, Go, natural developments in game research. ICCA J. 19, 103\u2013112 (1996)","journal-title":"ICCA J."},{"key":"14_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075","volume-title":"Randomized Algorithms","author":"R Motwani","year":"1995","unstructured":"Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)"},{"key":"14_CR24","unstructured":"Zamkauskas, W.: Amazons. \n                      http:\/\/www.chessvariants.org\/other.dir\/amazons.html"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:50:51Z","timestamp":1569383451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}