{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:43:51Z","timestamp":1760708631126,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/cig.2013.6633631","type":"proceedings-article","created":{"date-parts":[[2013,10,21]],"date-time":"2013-10-21T22:13:18Z","timestamp":1382393598000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["EvoMCTS: Enhancing MCTS-based players through genetic programming"],"prefix":"10.1109","author":[{"given":"Amit","family":"Benbassat","sequence":"first","affiliation":[]},{"given":"Moshe","family":"Sipper","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1465611.1465715"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2001576.2001629"},{"key":"18","article-title":"Modification of uct with patterns in monte-carlo go","author":"gelly","year":"2006","journal-title":"INRIA Tech Rep RR-6062"},{"key":"15","article-title":"Dodgem","author":"desjardins","year":"1996","journal-title":"Any Info?"},{"key":"16","first-page":"259","article-title":"Simulation-based approach to general game playing","author":"finnsson","year":"2008","journal-title":"The Twenty-Third AAAI Conference on Artificial Intelligence"},{"key":"13","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-540-75538-8_7","article-title":"Efficient selectivity and backup operators in monte-carlo tree search","author":"coulom","year":"2007","journal-title":"Computers and Games"},{"journal-title":"The Selfish Gene","year":"1976","author":"dawkins","key":"14"},{"key":"11","article-title":"Evolving monte-carlo tree search algorithms","volume":"8","author":"cazenave","year":"2007","journal-title":"Dept Inf Univ Paris"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1142\/S1793005708001094"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71605-1_8"},{"key":"20","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/978-3-540-31989-4_11","article-title":"GP-EndChess: Using genetic programming to evolve chess endgame players","volume":"3447","author":"hauptman","year":"2005","journal-title":"Proceedings of the 8th European Conference on Genetic Programming Ser Lecture Notes in Computer Science"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(90)90076-2"},{"key":"23","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1007\/11871842_29","article-title":"Bandit based monte-carlo planning","author":"kocsis","year":"2006","journal-title":"Machine Learning ECML 2006"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(90)90068-B"},{"key":"25","first-page":"228","article-title":"Code growth is not caused by introns","author":"luke","year":"2000","journal-title":"Late Breaking Papers at the 2000 Genetic and Evolutionary Computation Conference"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1995.3.2.199"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1080\/09540099550039228"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.856212"},{"key":"29","first-page":"21","article-title":"Chinook: The world man-machine checkers champion","volume":"17","author":"schaeffer","year":"1996","journal-title":"AI Magazine"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2010.2067212"},{"key":"2","doi-asserted-by":"crossref","first-page":"114","DOI":"10.3233\/ICG-2009-32218","article-title":"Mohex wins hex tournament","volume":"32","author":"arneson","year":"2009","journal-title":"ICGA Journal"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(01)00093-5"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(82)90003-0"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1126\/science.1144079"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2001858.2002080"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2010.5593376"},{"journal-title":"Adaptation and Natural Selection","year":"1966","author":"williams","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2330784.2330894"},{"journal-title":"Evolved to Win","year":"2011","author":"sipper","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-005-2990-0"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2009.2018702"},{"journal-title":"Winning Ways For Your Mathematical Plays","year":"1982","author":"berlekamp","key":"8"}],"event":{"name":"2013 IEEE Conference on Computational Intelligence and Games (CIG)","start":{"date-parts":[[2013,8,11]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2013,8,13]]}},"container-title":["2013 IEEE Conference on Computational Inteligence in Games (CIG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6613622\/6633607\/06633631.pdf?arnumber=6633631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T02:10:50Z","timestamp":1564539050000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6633631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cig.2013.6633631","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}