{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T08:22:11Z","timestamp":1769761331850,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/acc.2008.4587210","type":"proceedings-article","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T14:28:20Z","timestamp":1218551300000},"page":"4535-4540","source":"Crossref","is-referenced-by-count":8,"title":["Heuristic Dynamic Programming strategy with eligibility traces"],"prefix":"10.1109","author":[{"family":"Tao Li","sequence":"first","affiliation":[]},{"family":"Dongbin Zhao","sequence":"additional","affiliation":[]},{"family":"Jianqiang Yi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIC.2001.971484"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/3516.990890"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ADPRL.2007.368166"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-2696-8"},{"key":"16","author":"spong","year":"1997","journal-title":"Pendubot Installation and User Guide"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992701"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2006.371605"},{"key":"11","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1613\/jair.135","article-title":"truncating temporal differences: on the efficient implementation of td() for reinforcement learning","volume":"2","author":"cichosz","year":"1995","journal-title":"Journal of Artificial Intelligence Research"},{"key":"12","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1613\/jair.301","article-title":"reinforcement learning: a survey","volume":"4","author":"kaelbling","year":"1996","journal-title":"Journal of Artificial Intelligence Research"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/0895-7177(95)00226-X"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.1997.2319"},{"key":"1","first-page":"25","article-title":"advanced forecasting methods for global crisis warning and models of intelligence","volume":"22","author":"werbos","year":"1977","journal-title":"General System Yearbook"},{"key":"10","author":"sutton","year":"1998","journal-title":"Reinforcement Learning An Induction"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2002.801727"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/72.623201"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/72.914523"},{"key":"4","author":"kirk","year":"1970","journal-title":"Optimal Control Theory An Introduction"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544785"},{"key":"8","first-page":"990","article-title":"action-dependent adaptive critic designs","volume":"2","author":"liu","year":"2001","journal-title":"Proceedings of the 2001 IEEE International Joint Conference on Neural Networks"}],"event":{"name":"2008 American Control Conference (ACC '08)","location":"Seattle, WA","start":{"date-parts":[[2008,6,11]]},"end":{"date-parts":[[2008,6,13]]}},"container-title":["2008 American Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4547420\/4586444\/04587210.pdf?arnumber=4587210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T07:34:02Z","timestamp":1557732842000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4587210\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/acc.2008.4587210","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}