{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:04:10Z","timestamp":1725843850682},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319279466"},{"type":"electronic","value":"9783319279473"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27947-3_6","type":"book-chapter","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T21:04:34Z","timestamp":1450386274000},"page":"100-127","source":"Crossref","is-referenced-by-count":3,"title":["Identifying Critical Positions Based on Conspiracy Numbers"],"prefix":"10.1007","author":[{"given":"Mohd Nor Akmal","family":"Khalid","sequence":"first","affiliation":[]},{"given":"E. Mei","family":"Ang","sequence":"additional","affiliation":[]},{"given":"Umi Kalsom","family":"Yusof","sequence":"additional","affiliation":[]},{"given":"Hiroyuki","family":"Iida","sequence":"additional","affiliation":[]},{"given":"Taichi","family":"Ishitobi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,19]]},"reference":[{"key":"6_CR1","unstructured":"van den Herik, H.J., Donkers, H., Spronck, P.H.: Opponent modelling and commercial games. In: Proceedings of the IEEE 2005 Symposium on Computational Intelligence and Games (CIG05), pp. 15\u201325 (2005)"},{"key":"6_CR2","first-page":"201","volume":"16","author":"H Iida","year":"1993","unstructured":"Iida, H., Uiterwijk, J., van den Herik, H.J., Herschberg, I.: Potential applications of opponent-model search: Part 1. The domain of applicability. ICCA J. 16, 201\u2013208 (1993)","journal-title":"ICCA J."},{"key":"6_CR3","unstructured":"Carmel, D., Markovitch, S.: Learning models of opponent\u2019s strategy in game playing. Technion-Israel Institute of Technology, Center for Intelligent Systems (1993)"},{"key":"6_CR4","first-page":"10","volume":"17","author":"H Iida","year":"1994","unstructured":"Iida, H., Uiterwijk, J., van den Herik, H.J., Herschberg, I.: Potential applications of opponent-model search. Part 2: risks and strategies. ICCA J. 17, 10\u201314 (1994)","journal-title":"ICCA J."},{"key":"6_CR5","first-page":"135","volume":"18","author":"U Lorenz","year":"1995","unstructured":"Lorenz, U., Rottmann, V., Feldmann, R., Mysliwietz, P.: Controlled conspiracy number search. ICCA J. 18, 135\u2013147 (1995)","journal-title":"ICCA J."},{"key":"6_CR6","first-page":"1","volume":"134","author":"J Schaeffer","year":"2002","unstructured":"Schaeffer, J., van den Herik, H.J.: Games, computers, and artificial intelligence. Chips Challenging Champions Games Comput. Artif. Intell. 134, 1\u20138 (2002)","journal-title":"Chips Challenging Champions Games Comput. Artif. Intell."},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"131","DOI":"10.3233\/ICG-2012-35302","volume":"35","author":"A Kishimoto","year":"2012","unstructured":"Kishimoto, A., Winands, M.H., M\u00fcller, M., Saito, J.T.: Game-tree search using proof numbers: the first twenty years. ICGA J. 35, 131\u2013156 (2012)","journal-title":"ICGA J."},{"key":"6_CR8","unstructured":"Jansen, P.: Using knowledge about the opponent in game-tree search. Ph.D. thesis, Carnegie Mellon University (1992)"},{"key":"6_CR9","unstructured":"Donkers, J.: Nosce Hostem: Searching with Opponent Models. Ph.D. thesis, Universiteit Maastricht (2003)"},{"key":"6_CR10","unstructured":"Ramon, J., Jacobs, N., Blockeel, H.: Opponent modeling by analysing play. In: Proceedings of Workshop on Agents in Computer Games. Citeseer (2002)"},{"key":"6_CR11","unstructured":"McAllester, D.A.: A new procedure for growing min-max trees. Technical report, Artificial Intelligence Laboratory, MIT, Cambridge, MA, USA (1985)"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/0004-3702(88)90019-7","volume":"35","author":"DA McAllester","year":"1988","unstructured":"McAllester, D.A.: Conspiracy numbers for min-max search. Artif. Intell. 35, 287\u2013310 (1988)","journal-title":"Artif. Intell."},{"key":"6_CR13","first-page":"199","volume":"5","author":"J Schaeffer","year":"1989","unstructured":"Schaeffer, J.: Conspiracy numbers. Adv. Comput. Chess 5, 199\u2013218 (1989)","journal-title":"Adv. Comput. Chess"},{"key":"6_CR14","unstructured":"Elkan, C.: Conspiracy numbers and caching for searching and\/or trees and theorem-proving. In: IJCAI, pp. 341\u2013348 (1989)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/0004-3702(90)90071-7","volume":"43","author":"J Schaeffer","year":"1990","unstructured":"Schaeffer, J.: Conspiracy numbers. Artif. Intell. 43, 67\u201384 (1990)","journal-title":"Artif. Intell."},{"key":"6_CR16","first-page":"3","volume":"13","author":"M Meulen van der","year":"1990","unstructured":"van der Meulen, M.: Conspiracy-number search. ICCA J. 13, 3\u201314 (1990)","journal-title":"ICCA J."},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/0004-3702(94)90004-3","volume":"66","author":"LV Allis","year":"1994","unstructured":"Allis, L.V., van der Meulen, M., van den Herik, H.J.: Proof-number search. Artif. Intell. 66, 91\u2013124 (1994)","journal-title":"Artif. Intell."},{"key":"6_CR18","volume-title":"Theory of Games and Economic Behavior","author":"LJ Neumann","year":"1947","unstructured":"Neumann, L.J., Morgenstern, O.: Theory of Games and Economic Behavior, vol. 60. Princeton University Press Princeton, NJ (1947)"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1080\/14786445008521796","volume":"41","author":"CE Shannon","year":"1950","unstructured":"Shannon, C.E.: Xxii. programming a computer for playing chess. Philos. Mag. 41, 256\u2013275 (1950)","journal-title":"Philos. Mag."},{"key":"6_CR20","unstructured":"McAllester, D.A., Yuret, D.: Alpha-beta-conspiracy search (1993)"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-48957-6_8","volume-title":"Computers and Games","author":"M Buro","year":"1999","unstructured":"Buro, M.: From simple features to sophisticated evaluation functions. In: van den Herik, H.J., Iida, H. (eds.) CG 1998. LNCS, vol. 1558, pp. 126\u2013145. Springer, Heidelberg (1999)"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/0004-3702(82)90003-0","volume":"19","author":"PS Rosenbloom","year":"1982","unstructured":"Rosenbloom, P.S.: A world-championship-level othello program. Artif. Intell. 19, 279\u2013320 (1982)","journal-title":"Artif. Intell."},{"key":"6_CR23","unstructured":"Landau, T.: Othello: Brief & basic. US Othello Association 920, pp. 22980\u201323425 (1985)"},{"key":"6_CR24","unstructured":"Ishitobi, T., Cincotti, A., Iida, H.: Shape-keeping technique and its application to checkmate problem composition. In: Ninth Artificial Intelligence and Interactive Digital Entertainment Conference (2013)"}],"container-title":["Lecture Notes in Computer Science","Agents and Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27947-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:55:35Z","timestamp":1559336135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27947-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319279466","9783319279473"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27947-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}