|
[1] Tuomas Sandholm. The state of solving large incomplete-information games, and application to poker. AI Magazine, 31(4):13–32, 2010. [2] Michael Bowling, Johannes F&;uuml;rnkranz, Thore Graepel, and Ron Musick. Machine learning and games. Machine learning, 63(3):211–215, 2006. [3] Marc JV Ponsen, Jan Ramon, Tom Croonenborghs, Kurt Driessens, and Karl Tuyls. Bayes-relational learning of opponent models from incomplete information in nolimit poker. In Proceedings of the AAAI Conference on Artificial Intelligence, pages 1485–1486, 2008. [4] Lu&;iacute;s Filipe Te&;oacute;filo, Nuno Passos, Lu&;iacute;s Paulo Reis, and Henrique Lopes Cardoso. Adapting strategies to opponent models in incomplete information games: a reinforcement learning approach for poker. In Autonomous and Intelligent Systems, pages 220–227. 2012. [5] Matthew L Ginsberg. Gib: Imperfect information in a computationally challenging game. Journal of Artificial Intelligence Research, 14:303–358, 2001. [6] Matthew L Ginsberg. Gib: Steps toward an expert-level bridge-playing program. In Proceedings of International Joint Conference on Artificial Intelligence, pages 584– 593, 1999. [7] Takahisa Ando and Takao Uehara. Reasoning by agents in computer bridge bidding. In Computers and Games, pages 346–364. 2001. [8] Asaf Amit and Shaul Markovitch. Learning to bid in bridge. Machine Learning, 63(3):287–327, 2006. [9] Lori L DeLooze and James Downey. Bridge bidding with imperfect information. In IEEE Symposium on Computational Intelligence and Games, pages 368–373. IEEE, 2007. [10] Ming-Sheng Chang. Building a fast double-dummy bridge solver. 1996. [11] Alina Beygelzimer, Varsha Dani, Tom Hayes, John Langford, and Bianca Zadrozny. Error limiting reductions between classification tasks. In Proceedings of the 22nd International Conference on Machine Learning, pages 49–56, 2005. [12] Zhi-Hua Zhou and Xu-Ying Liu. On multi-class cost-sensitive learning. Computational Intelligence, 26(3):232–257, 2010. [13] Han-Hsing Tu and Hsuan-Tien Lin. One-sided support vector regression for multiclass cost-sensitive classification. In Proceedings of the 27th International Conference on Machine Learning, pages 1095–1102, 2010. [14] Wei Li, Xuerui Wang, Ruofei Zhang, Ying Cui, Jianchang Mao, and Rong Jin. Exploitation and exploration in a performance based contextual advertising system. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 27–36, 2010. [15] Wei Chu, Lihong Li, Lev Reyzin, and Robert E Schapire. Contextual bandits with linear payoff functions. In International Conference on Artificial Intelligence and Statistics, pages 208–214, 2011. [16] John Langford and Tong Zhang. The epoch-greedy algorithm for contextual multiarmed bandits. Advances in Neural Information Processing Systems, 20:1096–1103, 2007. [17] Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. Finite-time analysis of the multiarmed bandit problem. Machine learning, 47(2-3):235–256, 2002. [18] John Langford and Tong Zhang. The epoch-greedy algorithm for multi-armed bandits with side information. In Advances in Neural Information Processing Systems 20, pages 817–824, 2008. [19] Yves Costel. Wbridge5 bridge software, 2014. URL: http://www.wbridge5. com/. [20] Introduction to bridge scoring, 2005. URL: http://www.acbl.org/learn/ scoreTeams.html. [21] Chih-Chung Chang and Chih-Jen Lin. LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2:27:1–27:27, 2011. Software available at http://www.csie.ntu.edu.tw/~cjlin/ libsvm. [22] Standard american, 2014. URL: http://en.wikipedia.org/wiki/ Standard_American.
|