105
Views
0
CrossRef citations to date
0
Altmetric
Articles

Efficacy of a causal value function in game tree search

&
Pages 206-217 | Received 12 Feb 2015, Accepted 12 Jun 2015, Published online: 10 Aug 2015

References

  • C.B.  Browne , E.  Powley , D.  Whitehouse , S.M.  Lucas , P.I.  Cowling , P.  Rohlfshagen , S.  Tavener , D.  Perez , S.  Samothrakis , and S.  Colton , A survey of Monte Carlo tree search methods, IEEE Trans. Comput. Intell. AI Games.  4(1) (2012), pp. 1–43, doi: 10.1109/TCIAIG.2012.2186810.
  • B.  Bruegmann , Monte Carlo Go. Available at http://www.ideanest.com/vegos/MonteCarloGo.pdf  1993.
  • L.  Kocsis , and C.  Szepesvári , Bandit Based Monte-Carlo planning, in IEEE Transactions on Proceedings of the 17th European Conference on Machine Learning (ECML 2006), vol. 4212, LNCS, 2006, pp. 282–293.
  • P.  Auer , N.  Cesa-Bianchi , and P.  Fischer , Finite-time analysis of the multiarmed bandit problem, Mach. Learn.  47(2/3) (2002), pp. 235–256, doi: 10.1023/A:1013689704352.
  • R.J.  Lorentz , Amazons discover Monte-Carlo, in Proceedings of the 6th International Conference on Computers and Games, vol. 5131, LNCS, 2008, pp. 13–24.
  • J.  Kloetzer , H.  Iida , and B.  Bouzy , The Monte-Carlo approach in Amazons, in Proceedings of the Computer Games Workshop, Amsterdam, 2007, pp. 185–192.
  • M.H.M.  Winands , Y.  Björnssonand , and J.T.  Saito , Monte-Carlo tree search solver, in Proceedings of the 6th International Conference on Computers and Games, vol. 5131, LNCS, 2008, pp. 25–36.
  • M.P.  Schadd , M.H.  Winands , H.J.  Herik , G.M.  Chaslot , and J.W.  Uiterwijk , Single-player Monte-Carlo tree search, in Proceedings of the 6th International Conference on Computers and Games, vol. 5131, LNCS, 2008, pp. 1–12.
  • I.  Szita , G.  Chaslot , and P.  Spronck , Monte-Carlo tree search in settlers of Catan, in Proceedings of the 12th International Conference on Advances in Computer Games, vol. 6048, LNCS, 2010, pp. 21–32.
  • N.R.  Sturtevant , An analysis of UCT in multi-player games, in Proceedings of the 6th International Conference on Computers and Games, vol. 5131, LNCS, 2008, pp. 37–49.
  • B.  Arneson , R.B.  Hayward , and P.  Henderson , Monte carlo tree search in hex, IEEE Trans. Comput. Intell. AI Games.  2(4) (2010), pp. 251–258, doi: 10.1109/TCIAIG.2010.2067212.
  • N.  Ikehata , and T.  Ito , Monte-Carlo tree search in Ms. Pac-Man, IEEE Conference on Computational Intelligence and Games, 2011, pp. 39–46.
  • M.  Chung , M.  Buro , and J.  Schaeffer , Monte Carlo planning in RTS games, IEEE Conference on Computational Intelligence and Games, 2005, pp. 117–124.
  • R.K.  Balla , and A.  Fern , UCT for tactical assault planning in real-time strategy games, in Proceedings of the 21st International Joint Conference on Artificial Intelligence, Morgan Kaufmann, San Francisco, CA, USA, 2009, pp. 40–45.
  • S.  Shinohara , R.  Taguchi , K.  Katsurada , and T.  Nitta , A model of belief formation based on causality and application to n-armed bandit problem, Trans. Jpn. Soc. Artif. Intell.  22(1) (2007), pp. 58–68. in Japanesehttps://doi.org/10.1527/tjsai.22.58 .
  • T.  Takahashi , K.  Oyo , and S.  Shinohara , A loosely symmetric model of cognition, in Proceedings of the 10th European Conference on Artificial Life (ECAL 2009), vol. 5778, LNCS, 2011, pp. 234–241.
  • K.  Oyo , and T.  Takahashi , A cognitively inspired heuristic for two-armed bandit problems: The loosely symmetric (LS) Model, Procedia Comput. Sci.  24 (2013), pp. 194–204, doi: 10.1016/j.procs.2013.10.043.
  • K.  Oyo , M.  Ichino , and T.  Takahashi , Cognitive validity of a causal value function with loose symmetry and its effectiveness for n-armed bandit problems, Trans. Jpn. Soc. Artif. Intell.  30(2) (2015), pp. 403–416, in Japanesehttps://doi.org/10.1527/tjsai.30.403 .
  • R.S.  Sutton , and A.G.  Barto , Reinforcement Learning, MIT Press, Cambridge, 1998.
  • J.H.  Holland , Adaptation in Natural and Artificial Systems, MIT Press, Cambridge, 1998.
  • S.  Bubeck , and N.  Cesa-Bianchi , Regret analysis of stochastic and nonstochastic multi-armed bandit problems, Found. Trends Mach. Learn.  5(1) (2012), pp. 1–122, doi: 10.1561/2200000024.
  • J.R.  Anderson , and C.F.  Sheu , Causal inferences as perceptual judgments, Mem. Cognition.  23(4) (1995), pp. 510–524, doi: 10.3758/BF03197251.
  • T.  Gilovich , D.W.  Griffin , and D.  Kahneman , Heuristics and biases: The psychology of intuitive judgement, Cambridge University Press, Cambridge, 2002.
  • M.  Hattori , and M.  Oaksford , Adaptive non-interventional heuristics for covariation detection in causal induction: Model comparison and rational analysis, Cognit. Sci.  31(5) (2007), pp. 765–814, doi: 10.1080/03640210701530755.
  • M.  Toda , On the cognition of causality, Behav. Metrics  14(1) (1986), pp. 60–71.
  • A.  Tversky , and D.  Kahneman , The framing of decisions and the psychology of choice, Science.  211(4481) (1981), pp. 453–458, doi: 10.1126/science.7455683.
  • H.A.  Simon , Rational choice and the structure of the environment, Psychol. Rev.  63(2) (1956), pp. 129–138, doi: 10.1037/h0042769.
  • D.  Kahneman , and A.  Tversky , Prospect theory: An analysis of decision under risk, Econometrica.  47(2) (1979), pp. 263–291, doi: 10.2307/1914185.
  • D.  Uragami , T.  Takahashi , and Y.  Matsuo , Cognitively inspired reinforcement learning architecture and its application to giant-swing motion control, Biosystems.  116 (2014), pp. 1–9, doi: 10.1016/j.biosystems.2013.11.002.
  • S.  Gelly , Y.  Wang , R.  Munos , and O.  Teytaud , Modification of UCT with patterns in Monte-Carlo Go, Tech. Rep.. 6062.INRIA  2006.
  • R.  Coulom , Efficient selectivity and backup operators in Monte Carlo tree search, in Proceedings of the 5th International Conference on Computers and Games, vol. 4630, LNCS, 2007, pp. 72–83.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.