{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:25:43Z","timestamp":1725474343785},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642318658"},{"type":"electronic","value":"9783642318665"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31866-5_23","type":"book-chapter","created":{"date-parts":[[2012,7,18]],"date-time":"2012-07-18T21:51:08Z","timestamp":1342648268000},"page":"270-281","source":"Crossref","is-referenced-by-count":6,"title":["Modeling Games with the Help of Quantified Integer Linear Programs"],"prefix":"10.1007","author":[{"given":"Thorsten","family":"Ederer","sequence":"first","affiliation":[]},{"given":"Ulf","family":"Lorenz","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Opfer","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Allis, L.: Searching for solutions in games and artificial intelligence. Ph.D. thesis (1994)"},{"key":"23_CR2","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-32254-2_16","volume-title":"Mechanizing Mathematical Reasoning","author":"J. Benthem van","year":"2005","unstructured":"van Benthem, J.: An Essay on Sabotage and Obstruction. In: Hutter, D., Stephan, W. (eds.) Mechanizing Mathematical Reasoning. LNCS (LNAI), vol.\u00a02605, pp. 268\u2013276. Springer, Heidelberg (2005)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Condon, J., Thompson, K.: Belle chess hardware. In: Clarke, M.R.B. (ed.) Advances in Computer Chess III, pp. 44\u201354. Pergamon Press (1982)","DOI":"10.1016\/B978-0-08-026898-9.50007-3"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-75538-8_7","volume-title":"Computers and Games","author":"R. Coulom","year":"2007","unstructured":"Coulom, R.: Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search. In: van den Herik, H.J., Ciancarini, P., Donkers, H.H.L.M(J.) (eds.) CG 2006. LNCS, vol.\u00a04630, pp. 72\u201383. Springer, Heidelberg (2007)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/978-3-540-30117-2_101","volume-title":"Field Programmable Logic and Application","author":"C. Donninger","year":"2004","unstructured":"Donninger, C., Lorenz, U.: The Chess Monster Hydra. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol.\u00a03203, pp. 927\u2013932. Springer, Heidelberg (2004)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-642-23719-5_18","volume-title":"Algorithms \u2013 ESA 2011","author":"T. Ederer","year":"2011","unstructured":"Ederer, T., Lorenz, U., Martin, A., Wolf, J.: Quantified Linear Programs: A Computational Study. In: Demetrescu, C., Halld\u00f3rsson, M.M. (eds.) ESA 2011. LNCS, vol.\u00a06942, pp. 203\u2013214. Springer, Heidelberg (2011)"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0097-3165(81)90016-9","volume":"31","author":"A. Fraenkel","year":"1981","unstructured":"Fraenkel, A., Lichtenstein, D.: Computing a perfect strategy for n\u00d7n chess requires time exponential in n. J. Comb. Th. A\u00a031, 199\u2013214 (1981)","journal-title":"J. Comb. Th. A"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Fraenkel, A.S., Garey, M.R., Johnson, D.S., Schaefer, T., Yesha, Y.: The complexity of checkers on an n\u00d7n board. In: 19th Annual Symposium on Foundations of Computer Science (FOCS 1978), pp. 55\u201364 (1978)","DOI":"10.1109\/SFCS.1978.36"},{"key":"23_CR9","unstructured":"Hearn, R.: Amazons is pspace-complete. Tech. Rep. cs.CC\/0502013 (February 2005)"},{"issue":"2","key":"23_CR10","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3233\/ICG-2005-28206","volume":"28","author":"H. Herik van den","year":"2005","unstructured":"van den Herik, H., Nunn, J., Levy, D.: Adams outclassed by hydra. ICGA Journal\u00a028(2), 107\u2013110 (2005)","journal-title":"ICGA Journal"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/S0004-3702(01)00152-7","volume":"134","author":"H. Herik van den","year":"2002","unstructured":"van den Herik, H., Uiterwijk, J., van Rijswijk, J.: Games solved: Now and in the future. Artificial Intelligence\u00a0134, 277\u2013312 (2002)","journal-title":"Artificial Intelligence"},{"issue":"2","key":"23_CR12","first-page":"70","volume":"18","author":"F.H. Hsu","year":"1999","unstructured":"Hsu, F.H.: Ibm\u2019s deep blue chess grandmaster chips. IEEE Micro\u00a018(2), 70\u201380 (1999)","journal-title":"IEEE Micro"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Hsu, F.H., Anantharaman, T., Campbell, M.: No: Deep thought. In: Computers, Chess, and Cognition, pp. 55\u201378 (1990)","DOI":"10.1007\/978-1-4613-9080-0_5"},{"key":"23_CR14","unstructured":"Hyatt, R., Gower, B., H.L., N.: Cray blitz. In: Beal, D.F. (ed.) Advances in Computer Chess IV, pp. 8\u201318. Pergamon Press (1985)"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/0304-3975(94)90131-7","volume":"123","author":"S. Iwata","year":"1994","unstructured":"Iwata, S., Kasai, T.: The othello game on an n*n board is pspace-complete. Theoretical Computer Science\u00a0123, 329\u2013340 (1994)","journal-title":"Theoretical Computer Science"},{"key":"23_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/11871842_29","volume-title":"Machine Learning: ECML 2006","author":"L. Kocsis","year":"2006","unstructured":"Kocsis, L., Szepesv\u00e1ri, C.: Bandit Based Monte-Carlo Planning. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol.\u00a04212, pp. 282\u2013293. Springer, Heidelberg (2006)"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/978-3-540-45138-9_47","volume-title":"Mathematical Foundations of Computer Science 2003","author":"C. L\u00f6ding","year":"2003","unstructured":"L\u00f6ding, C., Rohde, P.: Solving the Sabotage Game Is PSPACE-Hard. In: Rovan, B., Vojt\u00e1\u0161, P. (eds.) MFCS 2003. LNCS, vol.\u00a02747, pp. 531\u2013540. Springer, Heidelberg (2003)"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Lorenz, U., Martin, A., Wolf, J.: Polyhedral and algorithmic properties of quantified linear programs. In: Annual European Symposium on Algorithms, pp. 512\u2013523 (2010)","DOI":"10.1007\/978-3-642-15775-2_44"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Papadimitriou, C.: Games against nature. J. of Comp. and Sys. Sc., 288\u2013301 (1985)","DOI":"10.1016\/0022-0000(85)90045-5"},{"key":"23_CR20","first-page":"273","volume-title":"Proceedings of the 14th International Joint Conference on Artificial Intelligence","author":"A. Plaat","year":"1995","unstructured":"Plaat, A., Schaeffer, J., Pijls, W., De Bruin, A.: Best-first fixed-depth game-tree search in practice. In: Proceedings of the 14th International Joint Conference on Artificial Intelligence, vol.\u00a01, pp. 273\u2013279. Morgan Kaufmann Publishers Inc., San Francisco (1995)"},{"key":"23_CR21","first-page":"5966","volume":"13","author":"S. Reisch","year":"1999","unstructured":"Reisch, S.: Gobang ist pspace-vollstandig (gomoku is pspace-complete). Acta Informatica\u00a013, 5966 (1999)","journal-title":"Acta Informatica"},{"key":"23_CR22","unstructured":"Robson, J.M.: The complexity of go. In: Proceedings of IFIP Congress, pp. 413\u2013417 (1983)"},{"key":"23_CR23","unstructured":"Silver, D.: Reinforcement Learning and Simulation-Based Search in Computer Go. Ph.D. thesis, University of Alberta (2009)"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Slate, D., Atkin, L.: Chess 4.5 - the northwestern university chess program. In: Frey, P.W. (ed.) Chess Skill in Man and Machine, pp. 82\u2013118. Springer (1977)","DOI":"10.1007\/978-3-662-06239-5_4"},{"key":"23_CR25","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-25984-8_26","volume-title":"Automated Reasoning","author":"K. Subramani","year":"2004","unstructured":"Subramani, K.: Analyzing Selected Quantified Integer Programs. In: Basin, D., Rusinowitch, M. (eds.) IJCAR 2004. LNCS (LNAI), vol.\u00a03097, pp. 342\u2013356. Springer, Heidelberg (2004)"},{"key":"23_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-40031-8_5","volume-title":"Computers and Games","author":"M.H.M. Winands","year":"2003","unstructured":"Winands, M.H.M., Uiterwijk, J.W.H.M., van den Herik, H.J.: PDS-PN: A New Proof-Number Search Algorithm. In: Schaeffer, J., M\u00fcller, M., Bj\u00f6rnsson, Y. (eds.) CG 2002. LNCS, vol.\u00a02883, pp. 61\u201374. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Games"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31866-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T23:14:41Z","timestamp":1556925281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31866-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642318658","9783642318665"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31866-5_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}