{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:08:00Z","timestamp":1746504480022,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662444399"},{"type":"electronic","value":"9783662444405"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44440-5_8","type":"book-chapter","created":{"date-parts":[[2014,10,30]],"date-time":"2014-10-30T04:56:22Z","timestamp":1414644982000},"page":"131-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Epistemic and Probabilistic ATL with Quantification and Explicit Strategies"],"prefix":"10.1007","author":[{"given":"Henning","family":"Schnoor","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,31]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"\u00c5gotnes, T., Goranko, V., Jamroga, W.: Alternating-time temporal logics with irrevocable strategies. In: Samet [12], pp. 15\u201324","DOI":"10.1145\/1324249.1324256"},{"issue":"5","key":"8_CR2","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1145\/585265.585270","volume":"49","author":"R Alur","year":"2002","unstructured":"Alur, R., Henzinger, T.A., Kupferman, O.: Alternating-time temporal logic. J. ACM 49(5), 672\u2013713 (2002)","journal-title":"J. ACM"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Br\u00e1zdil, T., Brozek, V., Forejt, V., Kucera, A.: Stochastic games with branching-time winning objectives. In: LICS, pp. 349\u2013358. IEEE Computer Society (2006)","DOI":"10.1109\/LICS.2006.48"},{"issue":"1\u20132","key":"8_CR4","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.tcs.2006.07.032","volume":"365","author":"K Chatterjee","year":"2006","unstructured":"Chatterjee, K., Henzinger, T.A., Jurdzinski, M.: Games with secure equilibria. Theor. Comput. Sci. 365(1\u20132), 67\u201382 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-540-74407-8_5","volume-title":"CONCUR 2007 \u2013 Concurrency Theory","author":"K Chatterjee","year":"2007","unstructured":"Chatterjee, K., Henzinger, T.A., Piterman, N.: Strategy logic. In: Caires, L., Vasconcelos, V.T. (eds.) CONCUR 2007. LNCS, vol. 4703, pp. 59\u201373. Springer, Heidelberg (2007)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-540-74835-9_28","volume-title":"Computer Security \u2013 ESORICS 2007","author":"V Cortier","year":"2007","unstructured":"Cortier, V., K\u00fcsters, R., Warinschi, B.: A cryptographic model for branching time security properties \u2013 the case of contract signing protocols. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 422\u2013437. Springer, Heidelberg (2007)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Chen, T., Lu, J.: Probabilistic alternating-time temporal logic and model checking algorithm. In: Lei, J. (ed.) FSKD (2), pp. 35\u201339. IEEE Computer Society (2007)","DOI":"10.1109\/FSKD.2007.458"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1145\/79147.79161","volume":"37","author":"JY Halpern","year":"1990","unstructured":"Halpern, J.Y., Moses, Y.: Knowledge and common knowledge in a distributed environment. J. ACM 37, 549\u2013587 (1990)","journal-title":"J. ACM"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Herzig, A., Troquard, N.: Knowing how to play: uniform choices in logics of agency. In: Nakashima, H., Wellman, M.P., Weiss, G., Stone, P. (eds) AAMAS, pp. 209\u2013216. ACM (2006)","DOI":"10.1145\/1160633.1160666"},{"key":"8_CR10","unstructured":"Jamroga, W.: Some remarks on alternating temporal epistemic logic. In: Proceedings of Formal Approaches to Multi-Agent Systems (FAMAS 2003), pp. 133\u2013140 (2004)"},{"issue":"2\u20133","key":"8_CR11","first-page":"185","volume":"63","author":"W Jamroga","year":"2004","unstructured":"Jamroga, W., van der Hoek, W.: Agents that know how to play. Fundamenta Informaticae 63(2\u20133), 185\u2013219 (2004)","journal-title":"Fundamenta Informaticae"},{"key":"8_CR12","unstructured":"Samet, D. (ed.): Proceedings of the 11th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2007), Brussels, Belgium, 25\u201327 June (2007)"},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/S1571-0661(05)82604-0","volume":"85","author":"P-Y Schobbens","year":"2004","unstructured":"Schobbens, P.-Y.: Alternating-time logic with imperfect recall. Electron. Notes Theoret. Comput. Sci. 85(2), 82\u201393 (2004)","journal-title":"Electron. Notes Theoret. Comput. Sci."},{"key":"8_CR14","unstructured":"Schnoor, H.: Strategic planning for probabilistic games with incomplete information. In: van der Hoek, W., Kaminka, G.A., Lesp\u00e9rance, Y., Luck, M., Sen, S. (eds) AAMAS, pp. 1057\u20131064. IFAAMAS (2010)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-642-33167-1_6","volume-title":"Computer Security \u2013 ESORICS 2012","author":"H Schnoor","year":"2012","unstructured":"Schnoor, H.: Deciding epistemic and strategic properties of cryptographic protocols. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 91\u2013108. Springer, Heidelberg (2012)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Walther, D., van der Hoek, W., Wooldridge, M.: Alternating-time temporal logic with explicit strategies. In: Samet [12], pp. 269\u2013278","DOI":"10.1145\/1324249.1324285"}],"container-title":["Communications in Computer and Information Science","Agents and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44440-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T21:21:01Z","timestamp":1746480061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44440-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662444399","9783662444405"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44440-5_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"31 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}