{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T01:05:19Z","timestamp":1648515919679},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2015,3,1]],"date-time":"2015-03-01T00:00:00Z","timestamp":1425168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Intell. AI Games"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/tciaig.2014.2326012","type":"journal-article","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T18:01:52Z","timestamp":1400695312000},"page":"53-65","source":"Crossref","is-referenced-by-count":5,"title":["Multiple Opponent Optimization of Prisoner\u2019s Dilemma Playing Agents"],"prefix":"10.1109","volume":"7","author":[{"given":"Daniel","family":"Ashlock","sequence":"first","affiliation":[]},{"given":"Joseph Alexander","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Hingston","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2243454"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2005.1554823"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2006.871253"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688322"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2005.1555022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1330882"},{"key":"ref37","author":"ashlock","year":"2008","journal-title":"Using priosoner's dilemma fingerprints to analyse evolved strategies"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2711-1","author":"borg","year":"1997","journal-title":"Modern Multidimensional Scaling Theory and Applications"},{"key":"ref35","author":"legendre","year":"1998","journal-title":"Numerical Ecology"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CIBCB.2006.330957"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2007.907593"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2012.2234464"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2009.2034269"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.2009459"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2011.2166268"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FOCI.2011.5949464"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2013.6633635"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102372"},{"key":"ref17","first-page":"119","article-title":"Multi-agentlearning experiments on repeated matrix games","author":"bouzy","year":"2010","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256428"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2011.5949747"},{"key":"ref28","author":"kim","year":"2005","journal-title":"Analysis of game playing agents with fingerprints"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2466\/PR0.86.3.1219-1225"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-9822(99)80321-2"},{"key":"ref27","author":"vonroeschlaub","year":"1994","journal-title":"Automated analysis of evolved strategies in iterated prisoner's dilemma"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1057\/ces.1994.6","article-title":"Cooperate or defect? Russian and American students in a prisoner's dilemma","volume":"176","author":"hemesath","year":"1994","journal-title":"Comparative Econ Studies"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1109\/TEVC.2008.920675","article-title":"Fingerprinting: Automatic analysis and visualization of prisoner's dilemma strategies","volume":"12","author":"ashlock","year":"2008","journal-title":"IEEE Trans Evol Comput"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1006\/jtbi.2000.2022"},{"key":"ref8","author":"axelrod","year":"1997","journal-title":"The Dynamics of Norms"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2009.2018704"},{"key":"ref2","author":"axelrod","year":"1984","journal-title":"The Evolution of Cooperation"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1126\/science.7466396","article-title":"The evolution of cooperation","volume":"211","author":"axelrod","year":"1981","journal-title":"Science"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2051673"},{"key":"ref20","first-page":"131","volume":"17","author":"stanley","year":"1994","journal-title":"Artificial Life III"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2012.6374135"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1331148"},{"key":"ref24","first-page":"453","volume":"15","author":"ashlock","year":"2005","journal-title":"Smart Engineering System Design Neural Networks Evolutionary Programming and Artificial Life"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2013.6633611"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/FOCI.2013.6602456"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.875423"}],"container-title":["IEEE Transactions on Computational Intelligence and AI in Games"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4804728\/7060572\/06819427.pdf?arnumber=6819427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:55Z","timestamp":1642003195000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6819427\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tciaig.2014.2326012","relation":{},"ISSN":["1943-068X","1943-0698"],"issn-type":[{"value":"1943-068X","type":"print"},{"value":"1943-0698","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3]]}}}