Difference between revisions of "Conspiracy Number Search"
GerdIsenberg (talk | contribs) (Created page with "'''Home * Search * Conspiracy Number Search''' '''Conspiracy Number Search''', (CNS, cns)<br/> a best-first search algorithm first described...") |
(No difference)
|
Revision as of 17:00, 8 December 2019
Home * Search * Conspiracy Number Search
Conspiracy Number Search, (CNS, cns)
a best-first search algorithm first described by David McAllester based on Conspiracy Numbers of the root.
Trees are grown in memory - in an often deep and narrow way - that maximizes the conspiracy required to change the root value.
The phases of the best-first search procedure are Selection of a leaf node, Expansion and Evaluation of that leaf, and to Back-up the result of that evaluation back to the root.
Since the number of conspiracy numbers per node depends on the number of possible evaluation values, fine grained evaluation, necessary for good positional play, yields to inefficient and unstable CNS.
Further, due to the lack of bounds, a final alpha-beta quiescence search in early CNS implementations was quite expensive.
Contents
Controlled Conspiracy Number Search
Ulf Lorenz' and Valentin Rottmann's et al. improvement dubbed Controlled Conspiracy Number Search (CCNS) address the drawbacks of CNS by introducing general CN Targets and Extended Conspiracy Numbers. CN targets (security demands) are splitted over the successors in order to inform each node about the goal of its examination. Extended Conspiracy Numbers of the root are defined as the least number of leaf nodes that must change their value in order to change the decision at the root to another move.
Parallel Controlled Conspiracy Number Search
The parallelization procedure aims at a dynamic distribution of the game tree, initiating a worker/employer relationship along with a sophisticated splitting heuristic of CN targets. The stack, used to keep the nodes of the best-first search, could be manipulated from outside in order to share work and integrate results from other processors [1].
Chess Programs
performing CNS or its improvements:
Publications
1985 ...
- David McAllester (1985). A New Procedure for Growing Minimax Trees. Technical Report, Artificial Intelligence Laboratory, MIT
- David McAllester (1988). Conspiracy Numbers for Min-Max Search. Artificial Intelligence, Vol. 35, No. 1, pp. 287-310. ISSN 0004-3702
- Ingo Althöfer (1988). Root Evaluation Errors: How they Arise and Propagate. ICCA Journal, Vol. 11, Nos. 2/3
- Maarten van der Meulen (1988). Parallel Conspiracy-Number Search. M.Sc. thesis, Faculty of Mathematics and Computer Science, Vrije Universteit, Amsterdam
- Norbert Klingbeil (1988). Search Strategies for Conspiracy Numbers. M.Sc. thesis
- Norbert Klingbeil, Jonathan Schaeffer (1988). Search Strategies for Conspiracy Numbers. Canadian Artificial Intelligence Conference, pp. 133-139
- Jonathan Schaeffer (1989). Conspiracy Numbers. Advances in Computer Chess 5 » also published in AI
- Charles Elkan (1989). Conspiracy Numbers and Caching for Searching And/Or Trees and Theorem-Proving. IJCAI 1989, pdf
1990 ...
- Maarten van der Meulen (1990). Conspiracy-Number Search. ICCA Journal, Vol. 13, No. 1
- Norbert Klingbeil, Jonathan Schaeffer (1990). Empirical Results with Conspiracy Numbers. Computational Intelligence, Vol. 6, pp. 1-11, ps
- Jonathan Schaeffer (1990). Conspiracy Numbers. Artificial Intelligence, Vol. 43, No. 1, pp. 67-84
- Maarten van der Meulen, Victor Allis, Jaap van den Herik ('1990). A Comment on `Conspiracy-Number Search. ICCA Journal, Vol. 13, No. 2
- Victor Allis, Maarten van der Meulen, Jaap van den Herik (1991). Conspiracy-Number Search. Advances in Computer Chess 6
- David McAllester, Deniz Yuret (1993). Alpha-Beta Conspiracy Search. ps (draft)
- Lisa Lister, Jonathan Schaeffer (1994). An Analysis of the Conspiracy Numbers Algorithm. Computers & Mathematics with Applications Vol. 27, No. 1, Elsevier, pdf
- Deniz Yuret (1994). The Principle of Pressure in Chess. TAINN 1994
1995 ...
- Ulf Lorenz, Valentin Rottmann, Rainer Feldmann, Peter Mysliwietz (1995). Controlled Conspiracy-Number Search. ICCA Journal, Vol. 18, No. 3
- Ulf Lorenz, Valentin Rottmann (1996). Parallel Controlled Conspiracy-Number Search. Advances in Computer Chess 8
- Ulf Lorenz (1999). Controlled Conspiracy-2 Search. Technical Report, Paderborn University, ps
- Robin Upton (1999). Dynamic Stochastic Control - A New Approach to Game Tree Searching. Ph.D. thesis, University of Warwick
2000 ...
- Ulf Lorenz (2000). Controlled Conspiracy-2 Search. Proceedings of the 17th Annual Symposium on Theoretical Aspects of Computer Science (STACS)
- David McAllester, Deniz Yuret (2002). Alpha-Beta Conspiracy Search. ICGA Journal, Vol. 25, No. 1
- Ulf Lorenz (2002). Parallel Controlled Conspiracy Number Search. Euro-Par 2002, LNCS 2400, Springer
2010 ...
- Mohd Nor Akmal Khalid, Umi Kalsom Yusof, Hiroyuki Iida, Taichi Ishitobi (2015). Critical Position Identification in Games and Its Application to Speculative Play. ICAART 2015
- Mohd Nor Akmal Khalid, E. Mei Ang, Umi Kalsom Yusof, Hiroyuki Iida, Taichi Ishitobi (2015). Identifying Critical Positions Based on Conspiracy Numbers. Agents and Artificial Intelligence, ICAART 2015 - Revised Selected Papers
- Jakub Pawlewicz, Ryan Hayward (2015). Sibling Conspiracy Number Search. SoCS 2015
- Quang Vu, Taichi Ishitobi, Jean-Christophe Terrillon, Hiroyuki Iida (2016). Using Conspiracy Numbers for Improving Move Selection in Minimax Game-Tree Search. ICAART 2016, pdf
- Zhang Song, Hiroyuki Iida (2018). Using single conspiracy number for long term position evaluation. CG 2018, ICGA Journal, Vol. 40, No. 3
References
- ↑ Ulf Lorenz, Valentin Rottmann (1996). Parallel Controlled Conspiracy-Number Search. Advances in Computer Chess 8