{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:40:09Z","timestamp":1750228809089,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,1,17]],"date-time":"2015-01-17T00:00:00Z","timestamp":1421452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/P505631\/1"],"award-info":[{"award-number":["EP\/P505631\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,1,17]]},"DOI":"10.1145\/2725494.2725503","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"176-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Convergence of Strategies in Simple Co-Adapting Games"],"prefix":"10.1145","author":[{"given":"Richard","family":"Mealing","sequence":"first","affiliation":[{"name":"University of Manchester, Manchester, United Kingdom"}]},{"given":"Jonathan L.","family":"Shapiro","sequence":"additional","affiliation":[{"name":"University of Manchester, Manchester, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2015,1,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Least-squares algorithms. http:\/\/bit.ly\/1rSLrJY. Accessed: 13\/04\/2014.  Least-squares algorithms. http:\/\/bit.ly\/1rSLrJY. Accessed: 13\/04\/2014."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1402821.1402862"},{"volume-title":"Bayesian online changepoint detection","year":"2007","author":"Adams R. P.","key":"e_1_3_2_1_3_1"},{"volume-title":"COLT 22","year":"2009","author":"Audibert J.-Y.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ADPRL.2013.6614986"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/860575.860686"},{"volume-title":"NIPS 17","year":"2005","author":"Bowling M.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(02)00121-2"},{"key":"e_1_3_2_1_10_1","first-page":"374","volume-title":"Activity Analysis of Production and Allocation","author":"Brown G. W.","year":"1951"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1527125.1527143"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2307\/1913795"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2681(85)90025-3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5193(89)80113-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014063505958"},{"volume-title":"ICAI","year":"2006","author":"Dudziak W.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2007.00601.x"},{"volume-title":"Pseudo-optimal solutions to texas hold'em poker with improved chance node abstraction","year":"2010","author":"Fellows I.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1761233.1761273"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1006\/game.1993.1021"},{"key":"e_1_3_2_1_21_1","first-page":"1065","article-title":"Consistency and cautious ctitious play","volume":"19","author":"Fudenberg D.","year":"1995","journal-title":"JEDC"},{"volume-title":"The Theory of Learning in Games","year":"1998","author":"Fudenberg D.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1109672110"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1765(99)00058-0"},{"volume-title":"Stability for the best response dynamics. Preprint Vienna","year":"1994","author":"Hofbauer J.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","first-page":"20","article-title":"Non-stationary policy learning in 2-player zero sum games","author":"Jensen S.","year":"2005","journal-title":"AAAI"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1006\/game.1993.1022"},{"key":"e_1_3_2_1_28_1","first-page":"92","article-title":"Learning in games with strategic complementarities","author":"Krishna V.","year":"1992","journal-title":"HBS Working Paper"},{"key":"e_1_3_2_1_29_1","first-page":"1231","article-title":"Convergent multiple-timescales reinforcement learning algorithms in normal form games","volume":"13","author":"Leslie D. S.","year":"2003","journal-title":"AAP"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2307\/2938316"},{"volume-title":"Technical report","year":"1961","author":"Miyasawa K.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.1996.0014"},{"volume-title":"NAS","year":"1950","author":"Nash J. F.","key":"e_1_3_2_1_33_1"},{"volume-title":"On some extensions of ctitious play","year":"2006","author":"Ny J. L.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","first-page":"296","article-title":"An iterative method of solving a game","volume":"54","author":"Robinson J.","year":"1951","journal-title":"AOM"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/45\/10\/105001"},{"key":"e_1_3_2_1_37_1","first-page":"1","article-title":"Some topics in two-person games","volume":"3","author":"Shapley L.","year":"1963","journal-title":"Advances in Game Theory"},{"key":"e_1_3_2_1_38_1","first-page":"16","article-title":"Nash convergence of gradient dynamics in general-sum games","author":"Singh S.","year":"2000","journal-title":"UAI"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxq006"},{"volume-title":"Adaptive forgetting factor ctitious play. CoRR, abs\/1112.2315:1--23","year":"2011","author":"Smyrnakis M.","key":"e_1_3_2_1_40_1"},{"volume-title":"NIPS Temporal Segmentation Workshop","year":"2009","author":"Turner R.","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00007"},{"key":"e_1_3_2_1_44_1","first-page":"24","article-title":"Multi-agent learning with policy prediction","author":"Zhang C.","year":"2010","journal-title":"AAAI"}],"event":{"name":"FOGA '15: Foundations of Genetic Algorithms XIII","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Aberystwyth United Kingdom","acronym":"FOGA '15"},"container-title":["Proceedings of the 2015 ACM Conference on Foundations of Genetic Algorithms XIII"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2725494.2725503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2725494.2725503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:32Z","timestamp":1750227392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2725494.2725503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,17]]},"references-count":43,"alternative-id":["10.1145\/2725494.2725503","10.1145\/2725494"],"URL":"https:\/\/doi.org\/10.1145\/2725494.2725503","relation":{},"subject":[],"published":{"date-parts":[[2015,1,17]]},"assertion":[{"value":"2015-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}