{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:29:54Z","timestamp":1773246594943,"version":"3.50.1"},"reference-count":57,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2010,2,11]],"date-time":"2010-02-11T00:00:00Z","timestamp":1265846400000},"content-version":"vor","delay-in-days":6616,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Cognitive Science"],"published-print":{"date-parts":[[1992,1]]},"abstract":"<jats:p>In adversarial problem solving (APS), one must anticipate, understand and counteract the actions of an opponent. Military strategy, business, and game playing all require an agent to construct a model of an opponent that includes the opponent's model of the agent. The cognitive mechanisms required for such modeling include deduction, analogy, inductive generalization, and the formation and evaluation of explanatory hypotheses. Explanatory coherence theory captures part of what is involved in APS, particularly in cases involving deception.<\/jats:p>","DOI":"10.1207\/s15516709cog1601_4","type":"journal-article","created":{"date-parts":[[2005,8,6]],"date-time":"2005-08-06T01:10:55Z","timestamp":1123290655000},"page":"123-149","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Adversarial Problem Solving: Modeling an Opponent Using Explanatory Coherence"],"prefix":"10.1111","volume":"16","author":[{"given":"Paul","family":"Thagard","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2010,2,11]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.47820"},{"key":"e_1_2_1_3_1","first-page":"32","volume-title":"Genetic algorithms and simulated annealing","author":"Axelrod R.","year":"1987"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.242.4884.1385"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(81)90003-5"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-12405-5_5"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(90)90055-5"},{"key":"e_1_2_1_8_1","volume-title":"Deception in World War II","author":"Cruickshank C.","year":"1979"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0778-144"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-75736-5"},{"key":"e_1_2_1_11_1","volume-title":"Formal investigation into the circumstances surrounding the downing of Iran Air Flight 655 on 3 July 1988","author":"Fogarty W.","year":"1988"},{"key":"e_1_2_1_12_1","volume-title":"Mental models","author":"Gentner D.","year":"1983"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(80)90013-4"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(83)90002-6"},{"key":"e_1_2_1_15_1","volume-title":"Thinking","author":"Gilhooly K.","year":"1988"},{"key":"e_1_2_1_16_1","first-page":"63","article-title":"Strategic intent","author":"Hamel G.","year":"1989","journal-title":"Harvard Business Review"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-322060-8.50018-8"},{"key":"e_1_2_1_18_1","volume-title":"Strategy","author":"Hart B.H. Liddell","year":"1954"},{"key":"e_1_2_1_19_1","volume-title":"The psychology of chess","author":"Holding D.","year":"1985"},{"key":"e_1_2_1_20_1","volume-title":"Induction: Processes of inference, learning, and discovery","author":"Holland J.","year":"1986"},{"key":"e_1_2_1_21_1","volume-title":"Analogical mapping between systems of social roles","author":"Holyoak K.","year":"1991"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1303_1"},{"key":"e_1_2_1_23_1","volume-title":"Mental models","author":"Johnson\u2010Laird P.","year":"1983"},{"key":"e_1_2_1_24_1","volume-title":"The mask of command","author":"Keegan J.","year":"1987"},{"key":"e_1_2_1_25_1","volume-title":"The second world war","author":"Keegan J.","year":"1989"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.105.3.217"},{"key":"e_1_2_1_27_1","volume-title":"Games and decisions","author":"Luce R.D.","year":"1957"},{"key":"e_1_2_1_28_1","volume-title":"Strategy: The logic of war and peace","author":"Luttwak E.","year":"1987"},{"key":"e_1_2_1_29_1","first-page":"69","volume-title":"Cognition in close relationships","author":"Miller L.","year":"1991"},{"key":"e_1_2_1_30_1","unstructured":"Nelson G. Thagard P. &Hardy S.(in press).Integrating analogies with rules and explanations. InJ.Barnden&K.Holyoak(Eds.) Advances in Connectionism Vol. 2: Analogical Connections. Norwood NJ :Ablex."},{"key":"e_1_2_1_31_1","unstructured":"Nowak G. &Thagard P.(in press\u2010a).Copernicus Ptolemy and explanatory coherence. InR.Giere(Ed.) Cognitive models of science Minnesota studies in the philosophy of science(Vol.15). Minneapolis :University of Minnesota Press."},{"key":"e_1_2_1_32_1","unstructured":"Nowak G. &Thagard P.(in press\u2010b).Newton Descartes and explanatory coherence. InR.Duschl&R.Hamilton(Eds.) Philosophy of science cognitive psychology and educational theory and practice. Albany :SUNY Press."},{"key":"e_1_2_1_33_1","volume-title":"Shared mental models and crew decision making","author":"Orasanu J.","year":"1990"},{"key":"e_1_2_1_34_1","volume-title":"Probabilistic reasoning in intelligent systems","author":"Pearl J.","year":"1988"},{"key":"e_1_2_1_35_1","volume-title":"Collected papers","author":"Peirce C.","year":"1931"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8682-5"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/3973604"},{"key":"e_1_2_1_38_1","volume-title":"Competitive strategy: Techniques for analyzing industries and competitors","author":"Porter M.","year":"1980"},{"key":"e_1_2_1_39_1","volume-title":"The science and art of negotiation","author":"Raiffa H.","year":"1982"},{"key":"e_1_2_1_40_1","unstructured":"Ranney M.(in press).Explorations in explanatory coherence. InE.Bar\u2010On B.Eylon &Z.Schertz(Eds.) Designing intelligent learning environments: From cognitive analysis to computer implementation. Ablex :Norwood NJ."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 10th Annual Conference of the Cognitive Science Society","author":"Ranney M.","year":"1988"},{"key":"e_1_2_1_42_1","volume-title":"Games and information","author":"Rasmusen E.","year":"1989"},{"key":"e_1_2_1_43_1","volume-title":"The role of explanatory coherence in the construction of social explanations","author":"Read S.","year":"1991"},{"key":"e_1_2_1_44_1","volume-title":"Waging business warfare","author":"Rogers D.","year":"1987"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the 13th Annual Conference of the Cognitive Science Society","author":"Schank P.","year":"1991"},{"key":"e_1_2_1_46_1","volume-title":"The art of war","author":"Tzu Sun","year":"1983"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the AAAI\u201088 Seventh National Conference on Artificial Intelligence","author":"Sycara K.","year":"1988"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1968.001.0001"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00057046"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/122388.1062338"},{"key":"e_1_2_1_51_1","doi-asserted-by":"crossref","first-page":"279","DOI":"10.7551\/mitpress\/5352.003.0014","volume-title":"Philosophy and AI: Essays at the interface","author":"Thagard P.","year":"1991"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1002\/jclp.20516"},{"key":"e_1_2_1_53_1","unstructured":"Thagard P.(in press\u2010a).Hypothesis formation. InM.Keane&K.Gilhooly(Eds.) Advances in the psychology of thinking(Vol.1). Hemel Hempstead :Harvester Wheatsheaf."},{"key":"e_1_2_1_54_1","volume-title":"Probabilistic networks and explanatory coherence","author":"Thagard P."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(90)90018-U"},{"key":"e_1_2_1_56_1","volume-title":"Computational models of discovery and theory formation","author":"Thagard P.","year":"1990"},{"key":"e_1_2_1_57_1","volume-title":"On war","year":"1968"},{"key":"e_1_2_1_58_1","volume-title":"The commanders","author":"Woodward B.","year":"1991"}],"container-title":["Cognitive Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1207%2Fs15516709cog1601_4","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1207\/s15516709cog1601_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,28]],"date-time":"2024-01-28T16:47:33Z","timestamp":1706460453000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1207\/s15516709cog1601_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,1]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1992,1]]}},"alternative-id":["10.1207\/s15516709cog1601_4"],"URL":"https:\/\/doi.org\/10.1207\/s15516709cog1601_4","archive":["Portico"],"relation":{},"ISSN":["0364-0213","1551-6709"],"issn-type":[{"value":"0364-0213","type":"print"},{"value":"1551-6709","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,1]]},"assertion":[{"value":"2010-02-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}