{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:07:00Z","timestamp":1776107220361,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3337722.3337723","type":"proceedings-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T12:32:59Z","timestamp":1567513979000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Automatic generation of tower defense levels using PCG"],"prefix":"10.1145","author":[{"given":"Simon","family":"Liu","sequence":"first","affiliation":[{"name":"LevelupAI"}]},{"given":"Li","family":"Chaoran","sequence":"additional","affiliation":[{"name":"LevelupAI"}]},{"given":"Li","family":"Yue","sequence":"additional","affiliation":[{"name":"LevelupAI"}]},{"given":"Ma","family":"Heng","sequence":"additional","affiliation":[{"name":"LevelupAI"}]},{"given":"Hou","family":"Xiao","sequence":"additional","affiliation":[{"name":"LevelupAI"}]},{"given":"Shen","family":"Yiming","sequence":"additional","affiliation":[{"name":"LevelupAI"}]},{"given":"Wang","family":"Licong","sequence":"additional","affiliation":[{"name":"LevelupAI"}]},{"given":"Chen","family":"Ze","sequence":"additional","affiliation":[{"name":"LevelupAI"}]},{"given":"Guo","family":"Xianghao","sequence":"additional","affiliation":[{"name":"LevelupAI"}]},{"given":"Lu","family":"Hengtong","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Du","family":"Yu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Tang","family":"Qinting","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of 8th International Conference on Information & Communication Technology and Systems (ICTS)","author":"Ariyadi R.","year":"2014"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the IEEE Congress on Evolutionary Computation (CEC","author":"Avery P.","year":"2011"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.010"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Saga Candy Crush","year":"2019"},{"key":"e_1_3_2_1_6_1","unstructured":"F. de M. Silva I. Borovikov J. Kolen N. Aghdaie and K. Zaman. 2018. Exploring Gameplay With AI Agents. arXiv 1811.06962v1 (November 2018).  F. de M. Silva I. Borovikov J. Kolen N. Aghdaie and K. Zaman. 2018. Exploring Gameplay With AI Agents. arXiv 1811.06962v1 (November 2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3235765.3235813"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"Duringer T.","year":"2017"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Epstein M.","year":"2016"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"N.","year":"2019"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"T. T. Guan Y. Y. Nan C. K. On J. Teo and R. Alfred. 2013. Automated Evaluation for AI Controllers in Tower Defense Game Using Genetic Algorithm. In Communications in Computer and Information Science. Springer 135--146.  T. T. Guan Y. Y. Nan C. K. On J. Teo and R. Alfred. 2013. Automated Evaluation for AI Controllers in Tower Defense Game Using Genetic Algorithm. In Communications in Computer and Information Science . Springer 135--146.","DOI":"10.1007\/978-3-642-40567-9_12"},{"key":"e_1_3_2_1_12_1","volume-title":"Human-Like Playtesting with Deep Learning. In IEEE Conference on Computational Intelligence and Games (CIG'18)","author":"Gudmundsson S. F."},{"key":"e_1_3_2_1_13_1","unstructured":"M. Guzdial J. Reno J. Chen G. Smith and M. Riedl. 2018. Explainable PCGML via Game Design Patterns. arXiv 1809.09419v1 (September 2018).  M. Guzdial J. Reno J. Chen G. Smith and M. Riedl. 2018. Explainable PCGML via Game Design Patterns. arXiv 1809.09419v1 (September 2018)."},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"SHOKIZM","year":"2019"},{"key":"e_1_3_2_1_15_1","unstructured":"I. Karth and A. M. Smith. 2018. Addressing the Fundamental Tension of PCGML with Discriminative Learning. arXiv 1809.04432v1 (September 2018).  I. Karth and A. M. Smith. 2018. Addressing the Fundamental Tension of PCGML with Discriminative Learning. arXiv 1809.04432v1 (September 2018)."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of ACM Conference on Foundations of Digital Games","author":"Liapis A.","year":"2013"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the ninth AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, October 14--18","author":"Shaker M.","year":"2013"},{"key":"e_1_3_2_1_18_1","volume-title":"Games: A Textbook and an Overview of Current Research","author":"Shaker N.","year":"2016"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2011.2159716"},{"key":"e_1_3_2_1_20_1","volume-title":"Retrieved","author":"Studio X","year":"2019"},{"key":"e_1_3_2_1_21_1","unstructured":"A. Summerville S. Snodgrass M. Guzdial C. Holmgard A. K. Hoover A. Isaksen A. Nealen and J. Togelius. 2017. Procedural Content Generation via Machine Learning (PCGML). arXiv 1702.00539v1 (February 2017).  A. Summerville S. Snodgrass M. Guzdial C. Holmgard A. K. Hoover A. Isaksen A. Nealen and J. Togelius. 2017. Procedural Content Generation via Machine Learning (PCGML). arXiv 1702.00539v1 (February 2017)."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of International Conference on Computer Science and Computational Intelligence (ICCSCI 2015","author":"Sutoyo R.","year":"2015"},{"key":"e_1_3_2_1_23_1","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton R. S.","year":"2018","edition":"2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205455.3205517"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"G. N. Yannakakis and J. Togelius. 2018. Artificial Intelligence and Games. Springer New York.   G. N. Yannakakis and J. Togelius. 2018. Artificial Intelligence and Games . Springer New York.","DOI":"10.1007\/978-3-319-63519-4"}],"event":{"name":"FDG '19: The Fourteenth International Conference on the Foundations of Digital Games","location":"San Luis Obispo California USA","acronym":"FDG '19"},"container-title":["Proceedings of the 14th International Conference on the Foundations of Digital Games"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337722.3337723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3337722.3337723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:05Z","timestamp":1750199585000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337722.3337723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":25,"alternative-id":["10.1145\/3337722.3337723","10.1145\/3337722"],"URL":"https:\/\/doi.org\/10.1145\/3337722.3337723","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}