LEADER 02935nam 2200589 a 450 001 9910484836703321 005 20200520144314.0 010 $a1-280-38646-0 010 $a9786613564382 010 $a3-642-12993-5 024 7 $a10.1007/978-3-642-12993-3 035 $a(CKB)2550000000011513 035 $a(SSID)ssj0000446241 035 $a(PQKBManifestationID)11293805 035 $a(PQKBTitleCode)TC0000446241 035 $a(PQKBWorkID)10491511 035 $a(PQKB)10349588 035 $a(DE-He213)978-3-642-12993-3 035 $a(MiAaPQ)EBC3065253 035 $a(PPN)149073054 035 $a(EXLCZ)992550000000011513 100 $a20100406d2010 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in computer games $e12th International Conference, ACG 2009, Pamplona Spain, May 11-13, 2009 revised papers /$fH. Jaap van den Herik, Pieter Spronck (eds.) 205 $a1st ed. 210 $aNew York $cSpringer$d2010 215 $a1 online resource (XIV, 233 p. 75 illus.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6048 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-12992-7 320 $aIncludes bibliographic references and index. 327 $aAdding Expert Knowledge and Exploration in Monte-Carlo Tree Search -- A Lock-Free Multithreaded Monte-Carlo Tree Search Algorithm -- Monte-Carlo Tree Search in Settlers of Catan -- Evaluation Function Based Monte-Carlo LOA -- Monte-Carlo Kakuro -- A Study of UCT and Its Enhancements in an Artificial Game -- Creating an Upper-Confidence-Tree Program for Havannah -- Randomized Parallel Proof-Number Search -- Hex, Braids, the Crossing Rule, and XH-Search -- Performance and Prediction: Bayesian Modelling of Fallible Choice in Chess -- Plans, Patterns, and Move Categories Guiding a Highly Selective Search -- 6-Man Chess and Zugzwangs -- Solving Kriegspiel Endings with Brute Force: The Case of KR vs. K -- Conflict Resolution of Chinese Chess Endgame Knowledge Base -- On Drawn K-In-A-Row Games -- Optimal Analyses for 3Śn AB Games in the Worst Case -- Automated Discovery of Search-Extension Features -- Deriving Concepts and Strategies from Chess Tablebases -- Incongruity-Based Adaptive Game Balancing -- Data Assurance in Opaque Computations. 410 0$aLecture notes in computer science ;$v6048. 606 $aVideo games$xProgramming$vCongresses 606 $aArtificial intelligence$vCongresses 615 0$aVideo games$xProgramming 615 0$aArtificial intelligence 676 $a794.81526 701 $aHerik$b Jaap van den$01758390 701 $aSpronck$b Pieter$01760036 712 12$aACG 2009 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484836703321 996 $aAdvances in computer games$94198793 997 $aUNINA LEADER 01999nam0 2200481 i 450 001 VAN00114391 005 20240806100751.522 017 70$2N$a978-3-319-30396-3 100 $a20180202d2016 |0itac50 ba 101 $aeng 102 $aCH 105 $a|||| ||||| 200 1 $aAlgebra for cryptologists$fAlko R. Meijer 210 $a[Cham]$cSpringer$d2016 215 $aXIV, 301 p.$cill.$d24 cm 410 1$1001VAN00100987$12001 $aSpringer undergraduate texts in mathematics and technology$1210 $aBerlin [etc.]$cSpringer$d2008- 500 1$3VAN00241883$aAlgebra for cryptologists$91523127 606 $a08-XX$xGeneral algebraic systems [MSC 2020]$3VANC022421$2MF 606 $a11Axx$xElementary number theory [MSC 2020]$3VANC019694$2MF 606 $a11Txx$xFinite fields and commutative rings (number-theoretic aspects) [MSC 2020]$3VANC021302$2MF 606 $a94A60$xCryptography [MSC 2020]$3VANC019699$2MF 610 $aAlgebra$9KW:K 610 $aAsymmetric cryptography$9KW:K 610 $aBlock ciphers$9KW:K 610 $aBoolean functions$9KW:K 610 $aCryptology$9KW:K 610 $aFinite fields$9KW:K 610 $aNumber theory$9KW:K 610 $aPublic key cryptography$9KW:K 610 $aSecret key cryptography$9KW:K 610 $aStream ciphers$9KW:K 610 $aSymmetric cryptography$9KW:K 620 $aCH$dCham$3VANL001889 700 1$aMeijer$bAlko R.$3VANV088482$0755812 712 $aSpringer $3VANV108073$4650 801 $aIT$bSOL$c20250314$gRICA 856 4 $uhttp://dx.doi.org/10.1007/978-3-319-30396-3$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA CENTRO DI SERVIZIO SBA$2VAN15 912 $fN 912 $aVAN00114391 950 $aBIBLIOTECA CENTRO DI SERVIZIO SBA$d15CONS SBA EBOOK 2094 $e15EB 2094 20180202 996 $aAlgebra for cryptologists$91523127 997 $aUNICAMPANIA