{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:18:49Z","timestamp":1753521529915,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/dasc-picom-datacom-cyberscitec.2016.33","type":"proceedings-article","created":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T21:33:46Z","timestamp":1476394426000},"page":"97-99","source":"Crossref","is-referenced-by-count":4,"title":["Review of Research on Computer Games for Tibetan Chess"],"prefix":"10.1109","author":[{"given":"Xiali","family":"Li","sequence":"first","affiliation":[]},{"given":"Songting","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Xinyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yongji","family":"Li","sequence":"additional","affiliation":[]},{"given":"Licheng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Junxian","family":"Duan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"37","article-title":"The Evidence of Tibetan Chess Culture: A Report on the Discoveries of the Chess Board in the Ruin of J ampa Migyur Ling Palace in Gyama Valley[J]","volume":"2","author":"sangpo","year":"2007","journal-title":"Tibetan Studies M"},{"key":"ref3","first-page":"44","article-title":"A Brief Discussion on the Social Sports Activities in Tibet in Qing Dynasty[J]","volume":"22","author":"linghui","year":"2007","journal-title":"Journal of Tibet University"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref6","first-page":"44","article-title":"On the discovery of Tibetan Chess (Mimang) and related traditional Tibetan chesses [J]","volume":"18","author":"dui","year":"2003","journal-title":"Journal of Tibet University"},{"key":"ref11","first-page":"83","article-title":"The status and promotion value of traditional Tibetan chess [J]","volume":"27","author":"liu","year":"2012","journal-title":"Contemporary Sports Technology"},{"key":"ref5","first-page":"112","article-title":"On the Study and Protection of Tibetan Chess[J]","volume":"1","author":"linghui","year":"2012","journal-title":"Tibetan Studies M"},{"key":"ref8","first-page":"106","article-title":"The design and implementation of Tibetan chess-&#x201C;Dalian&#x201D;[J]","volume":"8","author":"duojie","year":"2014","journal-title":"China Computer & Communication"},{"key":"ref7","first-page":"461","article-title":"Study of key issues in the palace two-door chess game system [J]","volume":"10","author":"pei","year":"2012","journal-title":"Microcomputer Information"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1631\/FITEE.DCAI2015","article-title":"Special issue on distributed computing and artificial intelligence[J]","volume":"17","author":"corchado","year":"2016","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"article-title":"The study of algorithm in Computer Go [D]","year":"2006","author":"chen","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(01)00129-1"}],"event":{"name":"2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech)2016","start":{"date-parts":[[2016,8,8]]},"location":"Auckland","end":{"date-parts":[[2016,8,12]]}},"container-title":["2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7585853\/7588794\/07588827.pdf?arnumber=7588827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T03:16:57Z","timestamp":1556248617000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7588827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/dasc-picom-datacom-cyberscitec.2016.33","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}