{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T10:06:31Z","timestamp":1742637991297},"reference-count":44,"publisher":"Hindawi Limited","issue":"4","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":24,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"name":"Raising Program of Major Project of Sun Yat-sen University","award":["1309089"],"award-info":[{"award-number":["1309089"]}]},{"name":"MOE Project of Key Research Institute of Humanities and Social Sciences at Universities","award":["13JJD720017"],"award-info":[{"award-number":["13JJD720017"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Intell. Syst."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1002\/int.21755","type":"journal-article","created":{"date-parts":[[2015,8,8]],"date-time":"2015-08-08T05:52:49Z","timestamp":1439013169000},"page":"347-378","source":"Crossref","is-referenced-by-count":7,"title":["Games Played under Fuzzy Constraints"],"prefix":"10.1155","volume":"31","author":[{"given":"Youzhi","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Logic and Cognition; Department of Philosophy, Sun Yat-sen University; Guangzhou People's Republic of China"}]},{"given":"Xudong","family":"Luo","sequence":"additional","affiliation":[{"name":"Institute of Logic and Cognition; Department of Philosophy, Sun Yat-sen University; Guangzhou People's Republic of China"}]},{"given":"Ho-fung","family":"Leung","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering; The Chinese University of Hong Kong; Hong Kong People's Republic of China"}]}],"member":"98","published-online":{"date-parts":[[2015,8,8]]},"reference":[{"key":"10.1002\/int.21755-BIB0001|int21755-cit-0001","volume-title":"An introduction to game theory","author":"Osborne","year":"2004"},{"key":"10.1002\/int.21755-BIB0002|int21755-cit-0002","volume-title":"A Discourse on inequality","author":"Rousseau","year":"1984"},{"issue":"2","key":"10.1002\/int.21755-BIB0003|int21755-cit-0003","doi-asserted-by":"crossref","first-page":"286","DOI":"10.2307\/1969529","article-title":"Non-cooperative games","volume":"54","author":"Nash","year":"1951","journal-title":"Ann Math"},{"issue":"5","key":"10.1002\/int.21755-BIB0004|int21755-cit-0004","first-page":"1281","article-title":"Incorporating fairness into game theory and economics","volume":"83","author":"Rabin","year":"1993","journal-title":"Am Econ Rev"},{"key":"10.1002\/int.21755-BIB0005|int21755-cit-0005","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/978-3-642-32695-0_11","article-title":"Incorporating fairness into agent interactions modeled as two-player normal-form games. In: PRICAI 2012: Trends in Artificial Intelligence","volume":"7458","author":"Hao","year":"2012","journal-title":"Lect Notes Comput Sci"},{"key":"10.1002\/int.21755-BIB0006|int21755-cit-0006","volume-title":"A companion to philosophy of law and legal theory, 2nd ed","author":"Fletcher","year":"2010"},{"key":"10.1002\/int.21755-BIB0007|int21755-cit-0007","volume-title":"Behavioral game theory: Experiments in strategic interaction","author":"Camerer","year":"2003"},{"issue":"3","key":"10.1002\/int.21755-BIB0008|int21755-cit-0008","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1016\/j.jebo.2011.01.019","article-title":"Preferences, intentions, and expectation violations: a large-scale experiment with a representative subject pool","volume":"8","author":"Bellemare","year":"2011","journal-title":"J Econ Behav Org"},{"issue":"2","key":"10.1002\/int.21755-BIB0009|int21755-cit-0009","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1016\/j.concog.2012.02.009","article-title":"Hypnotic ingroup-outgroup suggestion influences economic decision-making in an ultimatum game","volume":"21","author":"Br\u00fcne","year":"2012","journal-title":"Consciousness Cogn"},{"issue":"1-2","key":"10.1002\/int.21755-BIB0010|int21755-cit-0010","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/S0004-3702(03)00041-9","article-title":"A fuzzy constraint based model for bilateral, multi-issue negotiations in semi-competitive environments","volume":"148","author":"Luo","year":"2003","journal-title":"Artif Intell"},{"issue":"2","key":"10.1002\/int.21755-BIB0011|int21755-cit-0011","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/S0165-0114(02)00385-8","article-title":"Prioritised fuzzy constraint satisfaction problems: Axioms, instantiation and validation","volume":"136","author":"Luo","year":"2003","journal-title":"Fuzzy Sets Syst"},{"issue":"1","key":"10.1002\/int.21755-BIB0012|int21755-cit-0012","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1016\/j.eswa.2010.07.039","article-title":"On prioritized weighted aggregation in multi-criteria decision making","volume":"38","author":"Yan","year":"2011","journal-title":"Expert Syst Appl"},{"issue":"3","key":"10.1002\/int.21755-BIB0013|int21755-cit-0013","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s10458-010-9159-9","article-title":"Addressing stability issues in mediated complex contract negotiations for constraint-based, non-monotonic utility spaces","volume":"24","author":"Lopez-Carmona","year":"2012","journal-title":"Auton Agents Multi-Agent Syst"},{"key":"10.1002\/int.21755-BIB0014|int21755-cit-0014","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-642-33959-2_3","volume-title":"Intelligent systems: Models and applications","author":"Taka\u010di","year":"2013"},{"key":"10.1002\/int.21755-BIB0015|int21755-cit-0015","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.knosys.2012.01.017","article-title":"Prioritized fuzzy logic based information processing in relational databases","volume":"38","author":"\u0160krbi\u0107","year":"2013","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"10.1002\/int.21755-BIB0016|int21755-cit-0016","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1037\/h0029173","article-title":"Self-interest and the maintenance of equity","volume":"15","author":"Leventhal","year":"1970","journal-title":"J Pers Soc Psychol"},{"issue":"1","key":"10.1002\/int.21755-BIB0017|int21755-cit-0017","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/0165-0114(95)00133-6","article-title":"Uninorm aggregation operators","volume":"80","author":"Yager","year":"1996","journal-title":"Fuzzy Sets Syst"},{"issue":"2","key":"10.1002\/int.21755-BIB0018|int21755-cit-0018","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.artint.2006.11.004","article-title":"A spectrum of compromise aggregation operators for multi-attribute decision making","volume":"171","author":"Luo","year":"2007","journal-title":"Artif Intell"},{"key":"10.1002\/int.21755-BIB0019|int21755-cit-0019","doi-asserted-by":"crossref","DOI":"10.1002\/int.21742","article-title":"A spectrum of weighted compromise aggregation operators: A generalization of weighted uninorm operator","author":"Luo","year":"2015","journal-title":"Int J Intell Syst"},{"key":"10.1002\/int.21755-BIB0020|int21755-cit-0020","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/978-3-642-40948-6_23","article-title":"The task model of court investigation in a multi-agent system of argumentation in court. In: Logic, rationality, and interaction","volume":"8196","author":"Zhong","year":"2013","journal-title":"Lect Notes Comput Sci"},{"issue":"7","key":"10.1002\/int.21755-BIB0021|int21755-cit-0021","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1002\/int.21652","article-title":"A fuzzy dynamic belief logic system","volume":"29","author":"Jing","year":"2014","journal-title":"Int J Intell Syst"},{"key":"10.1002\/int.21755-BIB0022|int21755-cit-0022","volume-title":"A course in game theory","author":"Osborne","year":"1994"},{"key":"10.1002\/int.21755-BIB0023|int21755-cit-0023","volume-title":"The complete idiot's guide to game theory","author":"Rosenthal","year":"2011"},{"key":"10.1002\/int.21755-BIB0024|int21755-cit-0024","volume-title":"Altruism in humans","author":"Batson","year":"2011"},{"key":"10.1002\/int.21755-BIB0025|int21755-cit-0025","doi-asserted-by":"crossref","unstructured":"Huang F Luo X Leung H-f Zhong Q Games played by networked players Proc 2013 IEEE\/WIC\/ACM Int Joint Conf on Web Intelligence and Intelligent Agent Technology Atlanta, GA 2013","DOI":"10.1109\/WI-IAT.2013.83"},{"issue":"2","key":"10.1002\/int.21755-BIB0026|int21755-cit-0026","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.reseneeco.2004.08.001","article-title":"Coupled constraint Nash equilibria in environmental games","volume":"27","author":"Krawczyk","year":"2005","journal-title":"Resource Energy Econ"},{"issue":"2","key":"10.1002\/int.21755-BIB0027|int21755-cit-0027","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1002\/oca.849","article-title":"A differential environmental game with coupling constraints","volume":"30","author":"Tidball","year":"2009","journal-title":"Optim Control Appl Methods"},{"issue":"2","key":"10.1002\/int.21755-BIB0028|int21755-cit-0028","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s10666-012-9335-1","article-title":"A complementarity approach for an environmental-economic game with coupling emission constraints","volume":"18","author":"Han","year":"2013","journal-title":"Environ Model Assess"},{"issue":"3","key":"10.1002\/int.21755-BIB0029|int21755-cit-0029","doi-asserted-by":"crossref","first-page":"645","DOI":"10.2307\/20111838","article-title":"Games in fuzzy environments","volume":"72","author":"Aristidou","year":"2006","journal-title":"South Econ J"},{"issue":"22","key":"10.1002\/int.21755-BIB0030|int21755-cit-0030","doi-asserted-by":"crossref","first-page":"3184","DOI":"10.1016\/j.fss.2009.02.026","article-title":"Non-cooperative fuzzy games in normal form: A survey","volume":"160","author":"Larbani","year":"2009","journal-title":"Fuzzy Sets Syst"},{"issue":"3","key":"10.1002\/int.21755-BIB0031|int21755-cit-0031","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1023\/B:JOTA.0000004867.66302.16","article-title":"An approach to fuzzy noncooperative nash games","volume":"118","author":"Garagic","year":"2003","journal-title":"J Optim Theory Appl"},{"issue":"2-3","key":"10.1002\/int.21755-BIB0032|int21755-cit-0032","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/s00199-011-0636-4","article-title":"Are the treasures of game theory ambiguous?","volume":"48","author":"Eichberger","year":"2011","journal-title":"Econ Theory"},{"issue":"2","key":"10.1002\/int.21755-BIB0033|int21755-cit-0033","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1002\/int.21515","article-title":"Beliefs correspondences and equilibria in ambiguous games","volume":"27","author":"Marco","year":"2012","journal-title":"Int J Intell Syst"},{"key":"10.1002\/int.21755-BIB0034|int21755-cit-0034","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/978-3-642-35101-3_35","article-title":"Games with ambiguous payoffs and played by ambiguity and regret minimising players. In: AI 2012: Advances in Artificial Intelligence","volume":"7691","author":"Xiong","year":"2012","journal-title":"Lect Notes Comput Sci"},{"key":"10.1002\/int.21755-BIB0035|int21755-cit-0035","unstructured":"Ma W Luo X Liu W An ambiguity aversion framework of security games under ambiguities Proc 23rd Int Joint Conf on Artificial Intelligence 2013"},{"issue":"2","key":"10.1002\/int.21755-BIB0036|int21755-cit-0036","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1002\/int.21562","article-title":"A model for decision making with missing, imprecise, and uncertain evaluations of multiple criteria","volume":"28","author":"Ma","year":"2013","journal-title":"Int J Intell Syst"},{"issue":"3","key":"10.1002\/int.21755-BIB0037|int21755-cit-0037","first-page":"159","article-title":"Games with incomplete information played by \u201cBayesian\u201d players, Part I","volume":"14","author":"Harsanyi","year":"1967","journal-title":"The basic model. Manage Sci"},{"key":"10.1002\/int.21755-BIB0038|int21755-cit-0038","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/978-3-319-03680-9_2","article-title":"Security games with ambiguous information about attacker types","volume":"8272","author":"Zhang","year":"2013","journal-title":"In: AI 2013: Advances in Artificial Intelligence. Lect Notes Comput Sci"},{"key":"10.1002\/int.21755-BIB0039|int21755-cit-0039","doi-asserted-by":"crossref","unstructured":"Zhang Y Luo X Ma W Leung H-f Bayesian games with ambiguous type players Proc 2014 IEEE Int Joint Conf on Fuzzy Systems 2014","DOI":"10.1109\/FUZZ-IEEE.2014.6891576"},{"issue":"12","key":"10.1002\/int.21755-BIB0040|int21755-cit-0040","doi-asserted-by":"crossref","first-page":"1138","DOI":"10.1002\/int.21687","article-title":"Ambiguous Bayesian games","volume":"29","author":"Zhang","year":"2014","journal-title":"Int J Intell Syst"},{"issue":"7","key":"10.1002\/int.21755-BIB0041|int21755-cit-0041","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1002\/int.21598","article-title":"Probability-generated aggregators","volume":"28","author":"Kagan","year":"2013","journal-title":"Int J Intell Syst"},{"key":"10.1002\/int.21755-BIB0042|int21755-cit-0042","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.fss.2013.09.013","article-title":"On the structure of special classes of uninorms","volume":"240","author":"Petrk","year":"2014","journal-title":"Fuzzy Sets Syst"},{"issue":"4","key":"10.1002\/int.21755-BIB0043|int21755-cit-0043","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1002\/int.21694","article-title":"On weakly smooth uninorms on finite chain","volume":"30","author":"Li","year":"2015","journal-title":"Int J Intell Syst"},{"key":"10.1002\/int.21755-BIB0044|int21755-cit-0044","doi-asserted-by":"crossref","unstructured":"Zhang Y Luo X Leung H-f Fuzzily constrained games Proc 2013 IEEE\/WIC\/ACM Int Joint Conf on Web Intelligence and Intelligent Agent Technology 2013 361 368","DOI":"10.1109\/WI-IAT.2013.133"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fint.21755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/int.21755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:32:57Z","timestamp":1675956777000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.21755"}},"subtitle":["GAMES PLAYED UNDER FUZZY CONSTRAINTS"],"short-title":[],"issued":{"date-parts":[[2015,8,8]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,4]]}},"URL":"https:\/\/doi.org\/10.1002\/int.21755","archive":["Portico"],"relation":{},"ISSN":["0884-8173"],"issn-type":[{"value":"0884-8173","type":"print"}],"subject":[],"published":{"date-parts":[[2015,8,8]]}}}