{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:36:55Z","timestamp":1768030615195,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319579689","type":"print"},{"value":"9783319579696","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57969-6_8","type":"book-chapter","created":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T06:04:26Z","timestamp":1493359466000},"page":"101-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["AI Wolf Contest \u2014 Development of Game AI Using Collective Intelligence \u2014"],"prefix":"10.1007","author":[{"given":"Fujio","family":"Toriumi","sequence":"first","affiliation":[]},{"given":"Hirotaka","family":"Osawa","sequence":"additional","affiliation":[]},{"given":"Michimasa","family":"Inaba","sequence":"additional","affiliation":[]},{"given":"Daisuke","family":"Katagami","sequence":"additional","affiliation":[]},{"given":"Kosuke","family":"Shinoda","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Matsubara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,29]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"D Silver","year":"2016","unstructured":"Silver, D., Huang, A., Maddison, C.J., Guez, A., Sifre, L., van den Driessche, G., Schrittwieser, J., Antonoglou, I., Panneershelvam, V., Lanctot, M., Dieleman, S., Grewe, D., Nham, J., Kalchbrenner, N., Sutskever, I., Lillicrap, T., Leach, M., Kavukcuoglu, K., Graepel, T., Hassabis, D.: Mastering the game of Go with deep neural networks and tree search. Nature 529, 484\u2013489 (2016)","journal-title":"Nature"},{"key":"8_CR2","first-page":"1","volume":"26","author":"M Genesereth","year":"2005","unstructured":"Genesereth, M., Love, N., Pell, B.: General game playing: overview of the AAAI competition. AI Mag. 26, 1\u201316 (2005)","journal-title":"AI Mag."},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1126\/science.1259433","volume":"347","author":"M Bowling","year":"2015","unstructured":"Bowling, M., Burch, N., Johanson, M., Tammelin, O.: Heads-up limit hold\u2019em poker is solved. Science 347, 145\u2013149 (2015)","journal-title":"Science"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TCIAIG.2012.2188528","volume":"4","author":"S Karakovskiy","year":"2012","unstructured":"Karakovskiy, S., Togelius, J.: The Mario AI benchmark and competitions. IEEE Trans. Comput. Intell. AI Games 4, 55\u201367 (2012)","journal-title":"IEEE Trans. Comput. Intell. AI Games"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1978721.1978730","volume":"10","author":"MA Zinkevich","year":"2011","unstructured":"Zinkevich, M.A., Bowling, M., Wunder, M.: The lemonade stand game competition. ACM SIGecom Exchanges 10, 35\u201338 (2011)","journal-title":"ACM SIGecom Exchanges"},{"key":"8_CR6","unstructured":"ACPC: Computer Poker Competition. \n                    www.computerpokercompetition.org\/"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Kitano, H., Asada, M., Kuniyoshi, Y., Noda, I., Osawa, E.: RoboCup: the robot world cup initiative. In: Proceedings of the First International Conference on Autonomous Agents - AGENTS 1997, pp. 340\u2013347. ACM Press, New York (1997)","DOI":"10.1145\/267658.267738"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/66443.66444","volume":"21","author":"B Abramson","year":"1989","unstructured":"Abramson, B.: Control strategies for two-player games. ACM Comput. Surv. 21, 137\u2013161 (1989)","journal-title":"ACM Comput. Surv."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Krawiec, K., Szubert, M.G.: Learning N-tuple networks for othello by coevolutionary gradient search. In: Proceedings of the 13th Annual Conference on Genetic and Evolutionary Computation - GECCO 2011, pp. 355\u2013362. ACM Press, New York (2011)","DOI":"10.1145\/2001576.2001626"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/2093548.2093574","volume":"55","author":"S Gelly","year":"2012","unstructured":"Gelly, S., Kocsis, L., Schoenauer, M., Sebag, M., Silver, D., Szepesv\u00e1ri, C., Teytaud, O.: The grand challenge of computer Go. Commun. ACM 55, 106\u2013113 (2012)","journal-title":"Commun. ACM"},{"key":"8_CR11","unstructured":"Ganzfried, S., Sandholm, T.: Game theory-based opponent modeling in large imperfect-information games. In: International Conference on Autonomous Agents and Multiagent Systems, pp. 533\u2013540. International Foundation for Autonomous Agents and Multiagent Systems (2011)"},{"key":"8_CR12","unstructured":"Billings, D., Burch, N., Davidson, A., Holte, R., Schaeffer, J., Schauenberg, T., Szafron, D.: Approximating game-theoretic optimal strategies for full-scale poker. In: International Joint Conference on Artificial Intelligence, pp. 661\u2013668 (2003)"},{"key":"8_CR13","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1613\/jair.820","volume":"14","author":"ML Ginsberg","year":"2001","unstructured":"Ginsberg, M.L.: GIB: imperfect information in a computationally challenging game. J. Artif. Intell. Res. 14, 303\u2013358 (2001)","journal-title":"J. Artif. Intell. Res."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Whitehouse, D., Powley, E.J., Cowling, P.I.: Determinization and information set Monte Carlo tree search for the card game Dou Di Zhu. In: 2011 IEEE Conference on Computational Intelligence and Games (CIG 2011), pp. 87\u201394. IEEE (2011)","DOI":"10.1109\/CIG.2011.6031993"},{"key":"8_CR15","unstructured":"Inaba, M.I., Toriumi, F.U., Takahashi, K.E.: The statistical analysis of werewolf game data. In: Proceedings of Game Programming Workshop 2012, pp. 144\u2013147 (2012) (in Japanese)"},{"key":"8_CR16","unstructured":"Dias, J., Reis, H., Paiva, A.: Lie to me: virtual agents that lie. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, pp. 1211\u20131212 (2013)"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1214\/07-AAP456","volume":"18","author":"M Braverman","year":"2008","unstructured":"Braverman, M., Etesami, O., Mossel, E.: Mafia: a theoretical study of players and coalitions in a partial information environment. Ann. Appl. Probab. 18, 825\u2013846 (2008)","journal-title":"Ann. Appl. Probab."},{"key":"8_CR18","unstructured":"Yao, E.: A theoretical study of Mafia games (2008). Arxiv Prepr. \n                    arXiv:0804.0071"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Chittaranjan, G., Hung, H.: Are you a werewolf? Detecting deceptive roles and outcomes in a conversational role-playing game. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 5334\u20135337. IEEE (2010)","DOI":"10.1109\/ICASSP.2010.5494961"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Katagami, D., Kanazawa, M., Toriumi, F., Osawa, H., Inaba, M., Shinoda, K.: Movement design of a life-like agent for the werewolf game. In: IEEE International Conference on Fuzzy Systems, pp. 982\u2013987 (2015)","DOI":"10.1109\/FUZZ-IEEE.2015.7338087"},{"key":"8_CR21","first-page":"727","volume-title":"ACII 2007 Proceedings of the 2nd International Conference on Affective Computing and Intelligent Interaction","author":"F Xia","year":"2007","unstructured":"Xia, F., Wang, H., Huang, J.: Deception detection via blob motion pattern analysis. In: Paiva, A.C.R., Prada, R., Picard, R.W. (eds.) ACII 2007 Proceedings of the 2nd International Conference on Affective Computing and Intelligent Interaction, pp. 727\u2013728. Springer, Heidelberg (2007)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, L., Sung, Y.: Cues to deception in online chinese groups. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), p. 146. IEEE (2008)","DOI":"10.1109\/HICSS.2008.109"},{"key":"8_CR23","unstructured":"Aylett, R., Hall, L., Tazzyman, S., Endrass, B., Andr\u00e9, E., Ritter, C., Nazir, A., Paiva, A., H\u00f6fstede, G., Kappas, A.: Werewolves, cheats, and cultural sensitivity. In: Autonomous Agents and Multi-Agent Systems, pp. 1085\u20131092. International Foundation for Autonomous Agents and Multiagent Systems (2014)"},{"key":"8_CR24","unstructured":"White, M., Bowling, M.: Learning a value analysis tool for agent evaluation. In: IJCAI 2009 Proceedings of the 21st International Joint Conference on Artificial Intelligence, pp. 1976\u20131981 (2009)"},{"key":"8_CR25","unstructured":"Davidson, J., Archibald, C., Bowling, M.: Baseline: practical control variates for agent evaluation in zero-sum domains. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, pp. 1005\u20131012 (2013)"}],"container-title":["Communications in Computer and Information Science","Computer Games"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57969-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:31:06Z","timestamp":1558395066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57969-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319579689","9783319579696"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57969-6_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"29 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}