Discovery, utilization, and analysis of credible threats for 2X2 incomplete information games in TOM

Jolie Olsen, Sandip Sen. Discovery, utilization, and analysis of credible threats for 2X2 incomplete information games in TOM. In Maria L. Gini, Onn Shehory, Takayuki Ito, Catholijn M. Jonker, editors, International conference on Autonomous Agents and Multi-Agent Systems, AAMAS '13, Saint Paul, MN, USA, May 6-10, 2013. pages 1179-1180, IFAAMAS, 2013. [doi]

@inproceedings{OlsenS13-0,
  title = {Discovery, utilization, and analysis of credible threats for 2X2 incomplete information games in TOM},
  author = {Jolie Olsen and Sandip Sen},
  year = {2013},
  url = {http://dl.acm.org/citation.cfm?id=2485131},
  researchr = {https://researchr.org/publication/OlsenS13-0},
  cites = {0},
  citedby = {0},
  pages = {1179-1180},
  booktitle = {International conference on Autonomous Agents and Multi-Agent Systems, AAMAS '13, Saint Paul, MN, USA, May 6-10, 2013},
  editor = {Maria L. Gini and Onn Shehory and Takayuki Ito and Catholijn M. Jonker},
  publisher = {IFAAMAS},
  isbn = {978-1-4503-1993-5},
}