相似文献/References:
[1]孟祥宏.信息安全攻防博弈研究[J].计算机技术与发展,2010,(04):159.
MENG Xiang-hong.Study on Offence and Defense of Information Security Based on Game Theory[J].,2010,(03):159.
[2]付强 陈焕文.中国象棋人机对弈的自学习方法研究[J].计算机技术与发展,2007,(12):76.
FU Qiang,CHEN Huan-wen.Research on Methods of Self- Teaching of Chinese Chess Game[J].,2007,(03):76.