{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T06:06:15Z","timestamp":1749794775725},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642318658"},{"type":"electronic","value":"9783642318665"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31866-5_2","type":"book-chapter","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T01:51:08Z","timestamp":1342662668000},"page":"13-23","source":"Crossref","is-referenced-by-count":6,"title":["Revisiting Move Groups in Monte-Carlo Tree Search"],"prefix":"10.1007","author":[{"given":"Gabriel","family":"Van Eyck","sequence":"first","affiliation":[]},{"given":"Martin","family":"M\u00fcller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Audibert, J.-Y., Bubeck, S., Munos, R.: Best Arm Identification in Multi-Armed Bandits. In: COLT 2010, pp. 41\u201353 (2010)","key":"2_CR1"},{"doi-asserted-by":"crossref","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time Analysis of the Multiarmed Bandit Problem. In: Machine Learning, pp. 235\u2013256 (2002)","key":"2_CR2","DOI":"10.1023\/A:1013689704352"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1142\/S1793005708001094","volume":"4","author":"G.M.J.-B. Chaslot","year":"2008","unstructured":"Chaslot, G.M.J.-B., Winands, M.H.M., van den Herik, H.J., Uiterwijk, J.W.H.M., Bouzy, B.: Progressive Strategies for Monte-Carlo Tree Search. New Mathematics and Natural Computation (NMNC)\u00a04, 343\u2013357 (2008)","journal-title":"New Mathematics and Natural Computation (NMNC)"},{"doi-asserted-by":"crossref","unstructured":"Childs, B.E., Brodeur, J.H., Kocsis, L.: Transpositions and Move Groups in Monte Carlo Tree Search. In: Hingston, P., Barone, L. (eds.) IEEE Symposium on Computational Intelligence and Games, pp. 389\u2013395. IEEE (December 2008)","key":"2_CR4","DOI":"10.1109\/CIG.2008.5035667"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"1856","DOI":"10.1016\/j.artint.2011.03.007","volume":"175","author":"S. Gelly","year":"2011","unstructured":"Gelly, S., Silver, D.: Monte-Carlo Tree Search and Rapid Action Value Estimation in Computer Go. Artificial Intelligence\u00a0175, 1856\u20131875 (2011)","journal-title":"Artificial Intelligence"},{"key":"2_CR6","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/11871842_29","volume-title":"Machine Learning: ECML 2006","author":"L. Kocsis","year":"2006","unstructured":"Kocsis, L., Szepesv\u00e1ri, C.: Bandit Based Monte-Carlo Planning. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol.\u00a04212, pp. 282\u2013293. Springer, Heidelberg (2006)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-540-87608-3_2","volume-title":"Computers and Games","author":"R.J. Lorentz","year":"2008","unstructured":"Lorentz, R.J.: Amazons Discover Monte-Carlo. In: van den Herik, H.J., Xu, X., Ma, Z., Winands, M.H.M. (eds.) CG 2008. LNCS, vol.\u00a05131, pp. 13\u201324. Springer, Heidelberg (2008)"},{"unstructured":"M\u00fcller, M.: Fuego at the Computer Olympiad in Pamplona 2009: a Tournament Report. Technical report, University of Alberta, Dept. of Computing Science, TR09-09 (May 2009)","key":"2_CR8"},{"doi-asserted-by":"crossref","unstructured":"Saito, J.-T., Winands, M.H.M., Uiterwijk, J.W.H.M., van den Herik, H.J.: Grouping Nodes for Monte-Carlo Tree Search. In: Computer Games Workshop 2007, pp. 276\u2013283 (2007)","key":"2_CR9","DOI":"10.1007\/978-3-540-75538-8_5"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Gelly, S.: Modifications of UCT and Sequence-Like Simulations for Monte-Carlo Go. In: IEEE Symposium on Computational Intelligence and Games, pp. 175\u2013182. IEEE (April 2007)","key":"2_CR10","DOI":"10.1109\/CIG.2007.368095"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Games"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31866-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T02:56:36Z","timestamp":1642820196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31866-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642318658","9783642318665"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31866-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}