{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q2292111","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q2292111","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q2292111","kernelVersion":"v1","immutable":true,"modified":"2026-04-02T18:30:14Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q2292111","name":"Iterative computation of security strategies of matrix games with growing action set","headline":"Iterative computation of security strategies of matrix games with growing action set","description":"scientific article; zbMATH DE number 7161755","url":"https://portal.mardi4nfdi.de/entity/Q2292111","datePublished":"2020-02-03","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q273998"},{"@id":"https://portal.mardi4nfdi.de/entity/Q461473"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q257007"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1007/S13235-018-0283-5","url":"https://doi.org/10.1007/S13235-018-0283-5"},"sameAs":["https://doi.org/10.1007/S13235-018-0283-5"],"citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q2931707"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4317892"},{"@id":"https://portal.mardi4nfdi.de/entity/Q286267"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3950310"},{"@id":"https://portal.mardi4nfdi.de/entity/Q1083366"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3844775"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3586461"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2921721"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4066843"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5546402"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3583576"}]},"provenance":{"prov:generatedAtTime":"2026-04-02T18:30:14Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}