{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:25:48Z","timestamp":1725474348640},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642318658"},{"type":"electronic","value":"9783642318665"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31866-5_1","type":"book-chapter","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T01:51:08Z","timestamp":1342662668000},"page":"1-12","source":"Crossref","is-referenced-by-count":6,"title":["Accelerated UCT and Its Application to Two-Player Games"],"prefix":"10.1007","author":[{"given":"Junichi","family":"Hashimoto","sequence":"first","affiliation":[]},{"given":"Akihiro","family":"Kishimoto","sequence":"additional","affiliation":[]},{"given":"Kazuki","family":"Yoshizoe","sequence":"additional","affiliation":[]},{"given":"Kokolo","family":"Ikeda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2-3","key":"1_CR1","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P. Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Machine Learning\u00a047(2-3), 235\u2013256 (2002)","journal-title":"Machine Learning"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Bouzy, B., Helmstetter, B.: Monte Carlo Go developments. In: Proc. of the 10th International Conference on Advances in Computer Games (ACG 2010). IFIP, vol.\u00a0263, pp. 159\u2013174. Kluwer Academic (2003)","DOI":"10.1007\/978-0-387-35706-5_11"},{"key":"1_CR3","unstructured":"Br\u00fcgmann, B.: Monte Carlo Go (1993), http:\/\/www.ideanest.com\/vegos\/MonteCarloGo.pdf"},{"key":"1_CR4","unstructured":"Coquelin, P.-A., Munos, R.: Bandit algorithms for tree search. In: Proc. of the 23rd Conference on Uncertainty in Artificial Intelligence (UAI 2007), pp. 67\u201374. AUAI press (2007)"},{"issue":"4","key":"1_CR5","doi-asserted-by":"crossref","first-page":"198","DOI":"10.3233\/ICG-2007-30403","volume":"30","author":"R. Coulom","year":"2007","unstructured":"Coulom, R.: Computing Elo ratings of move patterns in the game of Go. ICGA Journal\u00a030(4), 198\u2013208 (2007)","journal-title":"ICGA Journal"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-75538-8_7","volume-title":"Computers and Games","author":"R. Coulom","year":"2007","unstructured":"Coulom, R.: Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search. In: van den Herik, H.J., Ciancarini, P., Donkers, H.H.L.M(J.) (eds.) CG 2006. LNCS, vol.\u00a04630, pp. 72\u201383. Springer, Heidelberg (2007)"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/TCIAIG.2010.2083662","volume":"2","author":"M. Enzenberger","year":"2010","unstructured":"Enzenberger, M., M\u00fcller, M., Arneson, B., Segal, R.: Fuego - an open-source framework for board games and Go engine based on Monte-Carlo tree search. IEEE Transactions on Computational Intelligence and AI in Games\u00a02(4), 259\u2013270 (2010)","journal-title":"IEEE Transactions on Computational Intelligence and AI in Games"},{"key":"1_CR8","unstructured":"Gelly, S.: Discounted UCB. Posted to Computer Go Mailing List (2007), http:\/\/www.mail-archive.com\/computer-go@computer-go.org\/msg02124.html"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Gelly, S., Silver, D.: Combining online and offline knowledge in UCT. In: Proc. of the 24th International Conference on Machine Learning (ICML 2007). ACM International Conference Proceeding Series, vol.\u00a0227, pp. 273\u2013280 (2007)","DOI":"10.1145\/1273496.1273531"},{"key":"1_CR10","unstructured":"Gelly, S., Wang, Y., Munos, R., Teytaud, O.: Modification of UCT with patterns in Monte-Carlo Go. Technical Report RR-6062, INRIA (2006)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-17928-0_8","volume-title":"Computers and Games","author":"S.-C. Huang","year":"2011","unstructured":"Huang, S.-C., Coulom, R., Lin, S.-S.: Monte-Carlo Simulation Balancing in Practice. In: van den Herik, H.J., Iida, H., Plaat, A. (eds.) CG 2010. LNCS, vol.\u00a06515, pp. 81\u201392. Springer, Heidelberg (2011)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Kloetzer, J., Iida, H., Bouzy, B.: A comparative study of solvers in Amazons endgames. In: Proc. of the IEEE Symposium on Computational Intelligence and Games (CIG 2008), pp. 378\u2013384. IEEE Press (2008)","DOI":"10.1109\/CIG.2008.5035665"},{"key":"1_CR13","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/11871842_29","volume-title":"Machine Learning: ECML 2006","author":"L. Kocsis","year":"2006","unstructured":"Kocsis, L., Szepesv\u00e1ri, C.: Bandit Based Monte-Carlo Planning. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol.\u00a04212, pp. 282\u2013293. Springer, Heidelberg (2006)"},{"key":"1_CR14","unstructured":"Kocsis, L., Szepesv\u00e1ri, C.: Discounted UCB. Video Lecture. In: The Lectures of PASCAL Second Challenges Workshop (2006), Slides are available at http:\/\/www.lri.fr\/~sebag\/Slides\/Venice\/Kocsis.pdf . Video is available at http:\/\/videolectures.net\/pcw06_venice\/"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-540-87608-3_2","volume-title":"Computers and Games","author":"R.J. Lorentz","year":"2008","unstructured":"Lorentz, R.J.: Amazons Discover Monte-Carlo. In: van den Herik, H.J., Xu, X., Ma, Z., Winands, M.H.M. (eds.) CG 2008. LNCS, vol.\u00a05131, pp. 13\u201324. Springer, Heidelberg (2008)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Ramanujan, R., Selman, B.: Trade-offs in sampling-based adversarial planning. In: Proc. of 21st International Conference on Automated Planning and Scheduling (ICAPS 2011), pp. 202\u2013209. AAAI (2011)","DOI":"10.1609\/icaps.v21i1.13472"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Silver, D., Tesauro, G.: Monte-Carlo simulation balancing. In: Proc. of the 26th International Conference on Machine Learning (ICML 2009). ACM International Conference Proceeding Series, vol.\u00a0382, pp. 945\u2013952 (2009)","DOI":"10.1145\/1553374.1553495"},{"issue":"1","key":"1_CR18","first-page":"9","volume":"3","author":"R.S. Sutton","year":"1988","unstructured":"Sutton, R.S.: Learning to predict by the methods of temporal differences. Machine Learning\u00a03(1), 9\u201344 (1988)","journal-title":"Machine Learning"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-12993-3_7","volume-title":"Advances in Computer Games","author":"F. Teytaud","year":"2010","unstructured":"Teytaud, F., Teytaud, O.: Creating an Upper-Confidence-Tree Program for Havannah. In: van den Herik, H.J., Spronck, P. (eds.) ACG 2009. LNCS, vol.\u00a06048, pp. 65\u201374. Springer, Heidelberg (2010)"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-12993-3_6","volume-title":"Advances in Computer Games","author":"D. Tom","year":"2010","unstructured":"Tom, D., M\u00fcller, M.: A Study of UCT and Its Enhancements in an Artificial Game. In: van den Herik, H.J., Spronck, P. (eds.) ACG 2009. LNCS, vol.\u00a06048, pp. 55\u201364. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Games"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31866-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T13:38:39Z","timestamp":1687613919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31866-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642318658","9783642318665"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31866-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}