It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_2016/BooksAll.2016.part33.utf8:95147898:2913
Source Library of Congress
Download Link /show-records/marc_loc_2016/BooksAll.2016.part33.utf8:95147898:2913?format=raw

LEADER: 02913cam a22003614a 4500
001 2006003725
003 DLC
005 20100128083829.0
008 060203s2007 flua b 001 0 eng
010 $a 2006003725
015 $aGBA648501$2bnb
016 7 $a013470717$2Uk
020 $a1584885882 (9781584885887 : alk. paper)
035 $a(OCoLC)ocm63703820
040 $aDLC$cDLC$dYDX$dBAKER$dUKM$dP#O$dDLC
042 $apcc
050 00 $aU22.3$b.K56 2007
082 00 $a355.4/8$222
245 00 $aAdversarial reasoning :$bcomputational approaches to reading the opponent's mind /$cedited by Alexander W. Kott, William M. McEneaney.
260 $aBoca Raton :$bCHapman & Hall/CRC,$cc2007.
300 $a340 p. :$bill. ;$c25 cm.
490 0 $aChapman & Hall/CRC computer and information science series
504 $aIncludes bibliographical references and index.
505 0 $aAbout the authors -- 1.1. Adversarial models for opponent intent inferencing / Eugene Santos Jr. and Qunhua Zhao -- 1.2. Human factors in opponent intent / Paul E. Nielsen, Jacob Crossman, and Randolph M. Jones -- 1.3. Extrapolation of the opponent's past behaviors / Sven A. Brueckner and H. Van Dyke Parunak -- 1.4. Plan recognition / Christopher Geib -- 2.1. Detecting deception / Christopher Elsaesser and Frank J. Stech -- 2.2. Deception as a semantic attack / Paul Thompson -- 2.3. Application and value of deception / Joao Pedro Hespanha -- 2.4. Robustness against deception / William M. McEneaney and Rajdeep Singh -- 3.1. The role of imperfect information / Austin Parker, Dana Nau, and V. S. Subrahmanian -- 3.2. Handling partial and corrupted information / Ashitosh Swarup and Jason L. Speyer -- 3.3. Strategies in large-scale problems / Boris Stilman, Vladimir Yakhnis, and Oleg Umanskiy -- 3.4 Learning to strategize / Gregory Calbert -- 3.5. Learning from and about the opponent / Pu Huang and Katia Sycara.
520 $aFeaturing approaches that draw from disciplines such as artificial intelligence and cognitive modeling, this book describes technologies and applications that address a broad range of practical problems, including military planning and command, military and foreign intelligence, antiterrorism and domestic security, as well as simulation and training systems. The authors present an overview of each problem and then discuss approaches and applications, combining theoretical rigor with accessibility. This comprehensive volume covers intent and plan recognition, deception discovery, and strategy formulation.
650 0 $aPsychology, Military.
650 0 $aEnemies$xPsychology.
650 0 $aIntention.
650 0 $aGame theory.
700 1 $aKott, Alexander W.
700 1 $aMcEneaney, William M.
856 41 $3Table of contents$uhttp://www.loc.gov/catdir/toc/ecip068/2006003725.html
856 42 $3Publisher description$uhttp://www.loc.gov/catdir/enhancements/fy0659/2006003725-d.html