000 02979nam a2200385 a 4500
005 20250930123225.0
008 070906s2007 flua b 001 0 eng
020 _a1584885882 (hbk.)
_cRM321.94
020 _a9781584885887 (hbk.)
039 9 _a200803171228
_bzarina
_c200803171149
_dzarina
_c200803141711
_dzarina
_c200803031232
_dmazarita
_y09-06-2007
_zfarid
040 _aUKM
090 _aU22.3.A389
090 _aU22.3
_b.A389
245 0 0 _aAdversarial reasoning :
_bcomputational approaches to reading the opponent's mind /
_cedited by Alexander W. Kott, William M. McEneaney
260 _aBoca Raton, Fla. :
_bChapman & Hall/CRC,
_c2007
300 _a340 p. :
_bill. ;
_c25 cm.
490 0 _aChapman & Hall/CRC computer and information science series
504 _aIncludes bibliographical references and index
505 0 _aAbout the authors -- 1.1. Adversarial models for opponent intent inferencing / Eugene Santos Jr. and Qunhua Zhao -- 1.2. Human factors in opponent intent / Paul E. Nielsen, Jacob Crossman, and Randolph M. Jones -- 1.3. Extrapolation of the opponent's past behaviors / Sven A. Brueckner and H. Van Dyke Parunak -- 1.4. Plan recognition / Christopher Geib -- 2.1. Detecting deception / Christopher Elsaesser and Frank J. Stech -- 2.2. Deception as a semantic attack / Paul Thompson -- 2.3. Application and value of deception / Joao Pedro Hespanha -- 2.4. Robustness against deception / William M. McEneaney and Rajdeep Singh -- 3.1. The role of imperfect information / Austin Parker, Dana Nau, and V. S. Subrahmanian -- 3.2. Handling partial and corrupted information / Ashitosh Swarup and Jason L. Speyer -- 3.3. Strategies in large-scale problems / Boris Stilman, Vladimir Yakhnis, and Oleg Umanskiy -- 3.4 Learning to strategize / Gregory Calbert -- 3.5. Learning from and about the opponent / Pu Huang and Katia Sycara
520 _aFeaturing approaches that draw from disciplines such as artificial intelligence and cognitive modeling, this book describes technologies and applications that address a broad range of practical problems, including military planning and command, military and foreign intelligence, antiterrorism and domestic security, as well as simulation and training systems. The authors present an overview of each problem and then discuss approaches and applications, combining theoretical rigor with accessibility. This comprehensive volume covers intent and plan recognition, deception discovery, and strategy formulation
650 0 _aPsychology, Military
650 0 _aEnemies (Persons)
_xPsychology
650 0 _aOpponents
_xPsychology
650 0 _aIntention
650 0 _aGame theory
_959824
700 1 _aKott, Alexander W.
700 1 _aMcEneaney, William M.
907 _a.b14001421
_b2021-05-28
_c2019-11-12
942 _c01
_n0
_kU22.3.A389
914 _avtls003356925
990 _aszj
991 _aProgram Sejarah
998 _at
_b2007-06-09
_cm
_da
_feng
_gflu
_y0
_z.b14001421
999 _c396531
_d396531