{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:46:35Z","timestamp":1729615595140,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/itw.2010.5593357","type":"proceedings-article","created":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T16:02:53Z","timestamp":1285948973000},"page":"162-169","source":"Crossref","is-referenced-by-count":0,"title":["A selective move generator for the game axis and allies"],"prefix":"10.1109","author":[{"given":"David L.","family":"St-Pierre","sequence":"first","affiliation":[]},{"given":"Mark H.M.","family":"Winands","sequence":"additional","affiliation":[]},{"given":"David A.","family":"Watt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(83)80015-0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-011356-2.50011-2"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-540-75538-8_7","article-title":"Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search","volume":"4630","author":"coulom","year":"2007","journal-title":"Computers and Games (CG 2006)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1142\/S1793005708001094"},{"key":"ref36","first-page":"384","article-title":"Reinforcement learning of strategies for Settlers of Catan","author":"pfeiffer","year":"2004","journal-title":"International Conference on Computer Games Artificial Intelligence Design and Education"},{"key":"ref35","first-page":"658","article-title":"Temperature Discovery Search","author":"m\u00fcller","year":"2004","journal-title":"Proceedings of the Nineteenth National Conference on Artificial Intelligence (AAAI"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/11674399_4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF01448847"},{"key":"ref11","first-page":"282","article-title":"Bandit based Monte-Carlo Planning","volume":"4212","author":"kocsis","year":"2006","journal-title":"Proceedings of the EMCL 2006"},{"key":"ref12","article-title":"Exploration exploitation in Go: UCT for Monte-Carlo Go","author":"gelly","year":"2006","journal-title":"NIPS-workshop on On-line Trading of Exploration and Exploitation"},{"journal-title":"Artificial Intelligence for Games","year":"2006","author":"millington","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/800173.809724"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(80)90039-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(77)90032-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12993-3_11"},{"journal-title":"Board and Table Games from Many Civilizations","year":"1950","author":"bell","key":"ref18"},{"journal-title":"TRIPLEA","year":"2010","key":"ref19"},{"key":"ref28","first-page":"2450","article-title":"Representing Kriegspiel States with Metapositions","author":"ciancarini","year":"2007","journal-title":"IJCAI '07"},{"key":"ref4","first-page":"138","article-title":"An Analysis of Forward Pruning","author":"smith","year":"1994","journal-title":"AAAI-94"},{"key":"ref27","first-page":"40","article-title":"UCT for Tactical Assault Planning in Real-Time Strategy Game","author":"balla","year":"2009","journal-title":"IJCAI-09"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2009.5286476"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(90)90067-A"},{"key":"ref29","first-page":"14","article-title":"Are there Practical Alternatives to Alpha-Beta in Computer Chess?","volume":"21","author":"junghanns","year":"1998","journal-title":"ICCA"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.3233\/ICG-1986-9309","article-title":"Experiments in Search and Knowledge","author":"schaeffer","year":"1986"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(01)00121-7"},{"key":"ref7","first-page":"692","article-title":"Search versus Knowledge in Game-Playing Programs Revisited","author":"junghanns","year":"1997","journal-title":"IJCAI-97"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/0004-3702(75)90019-3","article-title":"An Analysis of Alpha-Beta Pruning","volume":"6","author":"knuth","year":"1975","journal-title":"Artificial Intelligence"},{"key":"ref9","article-title":"Monte Carlo Go","author":"br\u00fcgmann","year":"1993","journal-title":"Tech Rep"},{"journal-title":"A Modern Approach","year":"2003","author":"russel","key":"ref1"},{"article-title":"Mind Games: Axis and Allies","year":"2009","author":"st-pierre","key":"ref20"},{"article-title":"A Multi-Agent System for Playing the Board Game Risk","year":"2005","author":"olsson","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1145\/1160633.1160737","article-title":"On using Multi-Agent Systems in Playing Board Games","author":"johansson","year":"2006","journal-title":"International Joint Conference on Autonomous Agents and Multiagent Systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/14786445008521796"},{"key":"ref23","article-title":"Challenge in Multi-player Gaming by Computers","volume":"s1995m","author":"loeb","year":"1995","journal-title":"The Diplomatic PouchZine"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-540-87608-3_2","article-title":"Amazons Discover Monte-Carlo","volume":"5131","author":"lorentz","year":"2008","journal-title":"Computers and Games (CG 2008)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12993-3_3"}],"event":{"name":"2010 IEEE Symposium on Computational Intelligence and Games (CIG)","start":{"date-parts":[[2010,8,18]]},"location":"Copenhagen, Denmark","end":{"date-parts":[[2010,8,21]]}},"container-title":["Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5581175\/5593317\/05593357.pdf?arnumber=5593357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T01:18:57Z","timestamp":1559697537000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5593357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/itw.2010.5593357","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}