{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:45:29Z","timestamp":1722912329770},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/cimca.2008.82","type":"proceedings-article","created":{"date-parts":[[2009,8,5]],"date-time":"2009-08-05T13:59:27Z","timestamp":1249480767000},"source":"Crossref","is-referenced-by-count":22,"title":["Game Player Strategy Pattern Recognition and How UCT Algorithms Apply Pre-knowledge of Player's Strategy to Improve Opponent AI"],"prefix":"10.1109","author":[{"given":"Suoju","family":"He","sequence":"first","affiliation":[]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Hongtao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sai","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhiqing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qiliang","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","author":"witten","year":"2005","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"2","author":"mitchell","year":"1997","journal-title":"Machine Learning"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.365"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-008-0045-8"},{"key":"6","article-title":"peter bentley article","year":"2008","journal-title":"Letting Stones Go Unturned"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1330969"},{"key":"4","author":"yannakakis","year":"2005","journal-title":"AI in computer games Generating interesting interactive opponents by the use of evolutionary computation"},{"key":"9","year":"0","journal-title":"Multi-armed Bandit"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492488"},{"key":"11","first-page":"282","article-title":"bandit based monte-carlo planning","author":"kocsis","year":"2006","journal-title":"European Conference on Machine Learning (ECML)"}],"event":{"name":"2008 International Conference on Computational Intelligence for Modelling Control & Automation","location":"Vienna, Austria","start":{"date-parts":[[2008,12,10]]},"end":{"date-parts":[[2008,12,12]]}},"container-title":["2008 International Conference on Computational Intelligence for Modelling Control & Automation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5172579\/5172580\/05172792.pdf?arnumber=5172792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T00:39:22Z","timestamp":1489797562000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5172792\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":11,"URL":"http:\/\/dx.doi.org\/10.1109\/cimca.2008.82","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}