iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/2000378.2000386
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:48:29Z","timestamp":1729626509499,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["040.11.177600.065.120.08N201600.065.120.08N-201227-80-001"],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,12]]},"DOI":"10.1145\/2000378.2000386","type":"proceedings-article","created":{"date-parts":[[2011,7,15]],"date-time":"2011-07-15T12:25:09Z","timestamp":1310732709000},"page":"65-74","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hidden protocols"],"prefix":"10.1145","author":[{"given":"Hans","family":"van Ditmarsch","sequence":"first","affiliation":[{"name":"University of Sevilla, Calle Camilo Jos\u00e9 Cela s\/n, Sevilla, Spain"}]},{"given":"Sujata","family":"Ghosh","sequence":"additional","affiliation":[{"name":"University of Groningen, AK Groningen, The Netherlands"}]},{"given":"Rineke","family":"Verbrugge","sequence":"additional","affiliation":[{"name":"University of Groningen, AK Groningen, The Netherlands"}]},{"given":"Yanjing","family":"Wang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2011,7,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8586.00138"},{"volume-title":"Harvard University Press","year":"1987","author":"Bratman M.","key":"e_1_3_2_1_2_1","unstructured":"M. Bratman . Intention, Plans, and Practical Reason . Harvard University Press , Cambridge (MA) , 1987 . M. Bratman. Intention, Plans, and Practical Reason. Harvard University Press, Cambridge (MA), 1987."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/321239.321249"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511620539","volume-title":"Using Language","author":"Clark H.","year":"1996","unstructured":"H. Clark . Using Language . Cambridge University Press , Cambridge , 1996 . H. Clark. Using Language. Cambridge University Press, Cambridge, 1996."},{"volume-title":"Chapman and Hall","year":"1971","author":"Conway J. H.","key":"e_1_3_2_1_5_1","unstructured":"J. H. Conway . Regular Algebra and Finite Machines . Chapman and Hall , 1971 . J. H. Conway. Regular Algebra and Finite Machines. Chapman and Hall, 1971."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/9.2.289"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050038"},{"volume-title":"Reasoning about Knowledge","year":"1995","author":"Fagin R.","key":"e_1_3_2_1_8_1","unstructured":"R. Fagin , J. Y. Halpern , M. Y. Vardi , and Y. Moses . Reasoning about Knowledge . MIT Press , Cambridge, MA, USA , 1995 . R. Fagin, J. Y. Halpern, M. Y. Vardi, and Y. Moses. Reasoning about Knowledge. MIT Press, Cambridge, MA, USA, 1995."},{"volume-title":"Syntax and semantics","year":"1975","author":"Grice H. P.","key":"e_1_3_2_1_9_1","unstructured":"H. P. Grice . Logic and conversation . In P. Cole and J. L. Morgan, editors, Syntax and semantics , volume 3 . New York : Academic Press , 1975 . H. P. Grice. Logic and conversation. In P. Cole and J. L. Morgan, editors, Syntax and semantics, volume 3. New York: Academic Press, 1975."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"417","DOI":"10.7551\/mitpress\/3839.003.0022","volume-title":"Intentions in Communication","author":"Grosz B.","year":"1990","unstructured":"B. Grosz and C. Sidner . Plans for discourse . In P. Cohen, J. Morgan, and M. Pollack, editors, Intentions in Communication , pages 417 -- 444 . MIT Press , Cambridge (MA), 1990 . B. Grosz and C. Sidner. Plans for discourse. In P. Cohen, J. Morgan, and M. Pollack, editors, Intentions in Communication, pages 417--444. MIT Press, Cambridge (MA), 1990."},{"volume-title":"Automata on guarded strings and applications. Technical report","year":"2001","author":"Kozen D.","key":"e_1_3_2_1_12_1","unstructured":"D. Kozen . Automata on guarded strings and applications. Technical report , Cornell University , Ithaca, NY, USA , 2001 . D. Kozen. Automata on guarded strings and applications. Technical report, Cornell University, Ithaca, NY, USA, 2001."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11225-005-3612-9"},{"volume-title":"Moscow","year":"2010","author":"Pacuit E.","key":"e_1_3_2_1_14_1","unstructured":"E. Pacuit and S. Simon . Reasoning with protocols under imperfect information (abstract). Short paper presentation at AiML 2010 , Moscow , 2010 . E. Pacuit and S. Simon. Reasoning with protocols under imperfect information (abstract). Short paper presentation at AiML 2010, Moscow, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025007018583"},{"issue":"1","key":"e_1_3_2_1_16_1","first-page":"1","article-title":"The logic of indirect speech","volume":"54","author":"Pinker S.","year":"2002","unstructured":"S. Pinker , M. Nowak , and J. Lee . The logic of indirect speech . Bulletin of Economic Research , 54 ( 1 ): 1 -- 45 , 2002 . S. Pinker, M. Nowak, and J. Lee. The logic of indirect speech. Bulletin of Economic Research, 54(1):1--45, 2002.","journal-title":"Bulletin of Economic Research"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/3087158.3087205"},{"volume-title":"Queen of Scots, to Quantum Cryptography","year":"1999","author":"Singh S.","key":"e_1_3_2_1_18_1","unstructured":"S. Singh . The Code Book: The Evolution of Secrecy from Mary , Queen of Scots, to Quantum Cryptography . Doubleday , New York, NY, USA , 1999 . S. Singh. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography. Doubleday, New York, NY, USA, 1999."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10992-008-9099-x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jc.2006.04.006"},{"key":"e_1_3_2_1_21_1","series-title":"Synthese Library","volume-title":"Dynamic Epistemic Logic","author":"van Ditmarsch H.","year":"2007","unstructured":"H. van Ditmarsch , W. van der Hoek , and B. Kooi . Dynamic Epistemic Logic , volume 337 of Synthese Library . Springer , 2007 . H. van Ditmarsch, W. van der Hoek, and B. Kooi. Dynamic Epistemic Logic, volume 337 of Synthese Library. Springer, 2007."},{"key":"e_1_3_2_1_22_1","series-title":"Texts in Games and Logic","volume-title":"Discourses on Social Software","author":"van Ditmarsch H.","year":"2009","unstructured":"H. van Ditmarsch , J. van Eijck , and R. Verbrugge . Common knowledge and common belief . In J. van Eijck and R. Verbrugge, editors, Discourses on Social Software , volume 5 of Texts in Games and Logic . Amsterdam University Press , Amsterdam , 2009 . H. van Ditmarsch, J. van Eijck, and R. Verbrugge. Common knowledge and common belief. In J. van Eijck and R. Verbrugge, editors, Discourses on Social Software, volume 5 of Texts in Games and Logic. Amsterdam University Press, Amsterdam, 2009."},{"volume-title":"Perception and change in update logic","year":"2011","author":"van Eijck J.","key":"e_1_3_2_1_23_1","unstructured":"J. van Eijck . Perception and change in update logic . In J. van Eijck and R. Verbrugge, editors, Games, Actions and Social Software, Texts in Logic and Games (FOLLI subseries of LNCS). Springer Verlag , Berlin, 2011 . J. van Eijck. Perception and change in update logic. In J. van Eijck and R. Verbrugge, editors, Games, Actions and Social Software, Texts in Logic and Games (FOLLI subseries of LNCS). Springer Verlag, Berlin, 2011."},{"volume-title":"Action emulation","year":"2008","author":"van Eijck J.","key":"e_1_3_2_1_24_1","unstructured":"J. van Eijck , J. Ruan , and T. Sadzik . Action emulation , 2008 . Unpublished manuscript, available at homepages.cwi.nl\/jve\/papers\/08\/ae\/ae.pdf. J. van Eijck, J. Ruan, and T. Sadzik. Action emulation, 2008. Unpublished manuscript, available at homepages.cwi.nl\/jve\/papers\/08\/ae\/ae.pdf."},{"volume-title":"Verkeerde Vriendschap: Lesbisch Leven in de Jaren 1920--1960","year":"1985","author":"van Kooten Niekerk A.","key":"e_1_3_2_1_25_1","unstructured":"A. van Kooten Niekerk and S. Wijmer . Verkeerde Vriendschap: Lesbisch Leven in de Jaren 1920--1960 . Sara , Amsterdam , 1985 . A. van Kooten Niekerk and S. Wijmer. Verkeerde Vriendschap: Lesbisch Leven in de Jaren 1920--1960. Sara, Amsterdam, 1985."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10849-008-9067-4"},{"key":"e_1_3_2_1_28_1","first-page":"189","volume-title":"Proceedings of the 4th Indian Conference on Logic and its Applications (ICLA 2011","author":"Wang Y.","year":"2010","unstructured":"Y. Wang . Reasoning about protocol change and knowledge . In Proceedings of the 4th Indian Conference on Logic and its Applications (ICLA 2011 ), LNAI 6521, pages 189 -- 203 . Springer , 2010 . Y. Wang. Reasoning about protocol change and knowledge. In Proceedings of the 4th Indian Conference on Logic and its Applications (ICLA 2011), LNAI 6521, pages 189--203. Springer, 2010."}],"event":{"name":"TARK XIII: Thirteenth conference on Theoretical Aspects of Rationality and Knowledge","acronym":"TARK XIII","location":"Groningen The Netherlands"},"container-title":["Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2000378.2000386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T19:15:28Z","timestamp":1712603728000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000378.2000386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,12]]},"references-count":26,"alternative-id":["10.1145\/2000378.2000386","10.1145\/2000378"],"URL":"https:\/\/doi.org\/10.1145\/2000378.2000386","relation":{},"subject":[],"published":{"date-parts":[[2011,7,12]]},"assertion":[{"value":"2011-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}