| 000 | 02979nam a2200385 a 4500 | ||
|---|---|---|---|
| 005 | 20250930123225.0 | ||
| 008 | 070906s2007 flua b 001 0 eng | ||
| 020 |
_a1584885882 (hbk.) _cRM321.94 |
||
| 020 | _a9781584885887 (hbk.) | ||
| 039 | 9 |
_a200803171228 _bzarina _c200803171149 _dzarina _c200803141711 _dzarina _c200803031232 _dmazarita _y09-06-2007 _zfarid |
|
| 040 | _aUKM | ||
| 090 | _aU22.3.A389 | ||
| 090 |
_aU22.3 _b.A389 |
||
| 245 | 0 | 0 |
_aAdversarial reasoning : _bcomputational approaches to reading the opponent's mind / _cedited by Alexander W. Kott, William M. McEneaney |
| 260 |
_aBoca Raton, Fla. : _bChapman & Hall/CRC, _c2007 |
||
| 300 |
_a340 p. : _bill. ; _c25 cm. |
||
| 490 | 0 | _aChapman & Hall/CRC computer and information science series | |
| 504 | _aIncludes bibliographical references and index | ||
| 505 | 0 | _aAbout the authors -- 1.1. Adversarial models for opponent intent inferencing / Eugene Santos Jr. and Qunhua Zhao -- 1.2. Human factors in opponent intent / Paul E. Nielsen, Jacob Crossman, and Randolph M. Jones -- 1.3. Extrapolation of the opponent's past behaviors / Sven A. Brueckner and H. Van Dyke Parunak -- 1.4. Plan recognition / Christopher Geib -- 2.1. Detecting deception / Christopher Elsaesser and Frank J. Stech -- 2.2. Deception as a semantic attack / Paul Thompson -- 2.3. Application and value of deception / Joao Pedro Hespanha -- 2.4. Robustness against deception / William M. McEneaney and Rajdeep Singh -- 3.1. The role of imperfect information / Austin Parker, Dana Nau, and V. S. Subrahmanian -- 3.2. Handling partial and corrupted information / Ashitosh Swarup and Jason L. Speyer -- 3.3. Strategies in large-scale problems / Boris Stilman, Vladimir Yakhnis, and Oleg Umanskiy -- 3.4 Learning to strategize / Gregory Calbert -- 3.5. Learning from and about the opponent / Pu Huang and Katia Sycara | |
| 520 | _aFeaturing approaches that draw from disciplines such as artificial intelligence and cognitive modeling, this book describes technologies and applications that address a broad range of practical problems, including military planning and command, military and foreign intelligence, antiterrorism and domestic security, as well as simulation and training systems. The authors present an overview of each problem and then discuss approaches and applications, combining theoretical rigor with accessibility. This comprehensive volume covers intent and plan recognition, deception discovery, and strategy formulation | ||
| 650 | 0 | _aPsychology, Military | |
| 650 | 0 |
_aEnemies (Persons) _xPsychology |
|
| 650 | 0 |
_aOpponents _xPsychology |
|
| 650 | 0 | _aIntention | |
| 650 | 0 |
_aGame theory _959824 |
|
| 700 | 1 | _aKott, Alexander W. | |
| 700 | 1 | _aMcEneaney, William M. | |
| 907 |
_a.b14001421 _b2021-05-28 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kU22.3.A389 |
||
| 914 | _avtls003356925 | ||
| 990 | _aszj | ||
| 991 | _aProgram Sejarah | ||
| 998 |
_at _b2007-06-09 _cm _da _feng _gflu _y0 _z.b14001421 |
||
| 999 |
_c396531 _d396531 |
||