WALTZ: A Strong Tzaar-Playing Program (English)
- New search for: Valla, T.
- New search for: Vesely, P.
- New search for: Valla, T.
- New search for: Vesely, P.
- New search for: Edwards, Matthew
In:
Critical infrastructure protection
;
81-96
;
2014
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:WALTZ: A Strong Tzaar-Playing Program
-
Contributors:
-
Conference:Advanced research workshop, Critical infrastructure protection ; 2012 ; Ankara
-
Published in:
-
Publisher:
- New search for: Ios Press
-
Place of publication:Amsterdam
-
Publication date:2014-01-01
-
Size:16 pages
-
Remarks:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Monte-Carlo Fork Search for Cooperative Path-FindingBouzy, B. et al. | 2014
- 1
-
NATO and Critical Infrastructure Resilience - Planning for the UnknownKerigan-Kyro, D. et al. | 2014
- 1
-
Methodological Challenges in the Study of Terrorist LeadersMaskaliunaite, A. et al. | 2014
- 13
-
Critical Infrastructure Protection: The EU PerspectiveNaucodie, F. et al. | 2014
- 14
-
Definition of Terrorist Act in International Law and Polish Criminal Law. Problems and Policy ImplicationsLibront, K. et al. | 2014
- 16
-
Building Large Compressed PDBs for the Sliding Tile PuzzleDobbelin, R. / Schutt, T. / Reinefeld, A. et al. | 2014
- 17
-
Leveraging Partnerships to Better Utilize Declining Resources: The Critical Infrastructure Risk Management Enhancement InitiativeBeland, M. et al. | 2014
- 27
-
Critical Infrastructure Protection in a Post-9/11 WorldKlain, D. et al. | 2014
- 27
-
In Favour of a Strategic as Opposed to a Scientific Approach to TerrorismMarton, P. et al. | 2014
- 28
-
Monte Carlo Tree Search in Simultaneous Move Games with Applications to GoofspielLanctot, M. / Lisy, V. / Winands, M.H.M. et al. | 2014
- 33
-
Practical Issues Facing Businesses in the Implementation of Critical Infrastructure ProtectionBlack, P. et al. | 2014
- 35
-
Crime and Terror: Vanishing and Emerging Threats - New Criminal MarketsRaufer, X. et al. | 2014
- 38
-
Towards a Full Understanding of Terrorist Leadership Elimination: a Research AgendaVan Dongen, T. et al. | 2014
- 39
-
Critical Infrastructure and its Impact on Energy SecurityCelikpala, M. et al. | 2014
- 44
-
Decision Trees for Computer Go Featuresvan Niekerk, F. / Kroon, S. et al. | 2014
- 45
-
Threats to Energy Resources and InfrastructureStaff et al. | 2014
- 50
-
Lone Wolves and Network Agents in Leaderless Jihad (The Case of the Boston Marathon Bombing Cell)Stepanova, E. et al. | 2014
- 55
-
Protecting Pipelines - BTC as a Case StudyStaff et al. | 2014
- 57
-
UCT Enhancements in Chinese Checkers Using an Endgame DatabaseRoschke, M. / Sturtevant, N.R. et al. | 2014
- 59
-
An Analysis of a Cyberattack on a Nuclear Plant: The STUXNET WormStaff et al. | 2014
- 63
-
Strategies to Counter Cyberattacks: Cyberthreats and Critical Infrastructure ProtectionKarabacak, B. / Tatar, U. et al. | 2014
- 64
-
The Importance of Southern Leaders in The Sahelisation and Hybridisation of AQIMCristiani, D. et al. | 2014
- 71
-
Automated Generation of New Concepts from General Game PlayingSato, Y. / Cazenave, T. et al. | 2014
- 74
-
How Terrorists End in the Afpak Region? - the Extermination of Leadership, Mid-Rank Commanders and Foot Soldiers 2004-2012Machnikowski, R.M. et al. | 2014
- 75
-
Transportation Security in the Context of Defense against TerrorismComan, C. et al. | 2014
- 81
-
WALTZ: A Strong Tzaar-Playing ProgramValla, T. / Vesely, P. et al. | 2014
- 83
-
Valuable and Vulnerable: Protecting Maritime InfrastructureWilson, B. et al. | 2014
- 84
-
Psychological Profile and Types of Leaders of Terrorist Structures - Generic Views and Experiences from the Activities of Illegal Groups and Organizations in the Republic of MacedoniaBatkovski, T. / Rajkocevski, R. et al. | 2014
- 93
-
Planning Methodology for Critical Infrastructures Protection CapabilitiesBordas, M. / Tomolya, J. et al. | 2014
- 97
-
Perfectly Solving Domineering BoardsUiterwijk, J.W.H.M. et al. | 2014
- 103
-
Leadership and Right-Wing Extremist Violence: Case Studies from the Czech TerritoryMares, M. et al. | 2014
- 111
-
Contesting Religious Authority in Jordanian Salafi NetworksWagemakers, J. et al. | 2014
- 122
-
How Relevant Are Chess Composition Conventions?Iqbal, A. et al. | 2014
- 126
-
Two faces of Islam in the Western Balkans: Between Political Ideology and Islamist RadicalizationBabic, M. et al. | 2014
- 138
-
Intelligence in the Republic of Macedonia in the Fight Against TerrorismStevkovski, L. et al. | 2014