SINGULAR EXTENSIONS - ADDING SELECTIVITY TO BRUTE-FORCE SEARCHING

被引:46
|
作者
ANANTHARAMAN, T
CAMPBELL, MS
HSU, FH
机构
[1] Department of Computer Science, Carnegie-Mellon University, Pittsburgh
关键词
D O I
10.1016/0004-3702(90)90073-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Brute-force alpha-beta search of games trees has proven relatively effective in numerous domains. In order to further improve performance, many brute-force game-playing programs have used the technique of selective deepening, searching more deeply on lines of play identified as important. Typically these extensions are based on static, domain-dependent knowledge. This paper describes a modification of brute-force search, singular extensions, that allows extensions to be identified in a dynamic, domain-independent, low-overhead manner. Singular extensions, when implemented in a chess-playing program, resulted in significant performance improvements. © 1990.
引用
收藏
页码:99 / 109
页数:11
相关论文
共 50 条
  • [21] Protecting financial institutions from brute-force attacks
    Herley, Cormac
    Florencio, Dinei
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 681 - 685
  • [22] Fast Network-Based Brute-Force Detection
    Koch, Robert
    Rodosek, Gabi Dreo
    EIGHTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (AICT 2012), 2012, : 184 - 190
  • [23] PUMP CONTROLS FINESSE BRUTE-FORCE DESIGN.
    Bagat, Arjun
    Orban, Paul
    Hydraulics and Pneumatics, 1985, 38 (05): : 53 - 56
  • [24] InfinityGauntlet: Brute-force Attack on Smartphone Fingerprint Authentication
    Chen, Yu
    Yu, Yang
    Zhai, Lidong
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2027 - 2041
  • [25] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Yicheng Xu
    Vincent Chau
    Chenchen Wu
    Yong Zhang
    Vassilis Zissimopoulos
    Yifei Zou
    Algorithmica, 2024, 86 : 130 - 146
  • [26] Honey Encryption Encryption beyond the Brute-Force Barrier
    Juels, Ari
    Ristenpart, Thomas
    IEEE SECURITY & PRIVACY, 2014, 12 (04) : 59 - 62
  • [27] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Xu, Yicheng
    Chau, Vincent
    Wu, Chenchen
    Zhang, Yong
    Zissimopoulos, Vassilis
    Zou, Yifei
    ALGORITHMICA, 2024, 86 (01) : 130 - 146
  • [28] BAL: A library for the brute-force analysis of dynamical systems
    Linaro, Daniele
    Storace, Marco
    COMPUTER PHYSICS COMMUNICATIONS, 2016, 201 : 126 - 134
  • [29] A New Distributed Brute-Force Password Cracking Technique
    Tirado, Emanuel
    Turpin, Brendan
    Beltz, Cody
    Roshon, Phillip
    Judge, Rylin
    Gagneja, Kanwal
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 117 - 127
  • [30] An efficient brute-force solution to the network reconfiguration problem
    Morton, AB
    Mareels, IMY
    IEEE TRANSACTIONS ON POWER DELIVERY, 2000, 15 (03) : 996 - 1000