SINGULAR EXTENSIONS - ADDING SELECTIVITY TO BRUTE-FORCE SEARCHING

被引:46
|
作者
ANANTHARAMAN, T
CAMPBELL, MS
HSU, FH
机构
[1] Department of Computer Science, Carnegie-Mellon University, Pittsburgh
关键词
D O I
10.1016/0004-3702(90)90073-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Brute-force alpha-beta search of games trees has proven relatively effective in numerous domains. In order to further improve performance, many brute-force game-playing programs have used the technique of selective deepening, searching more deeply on lines of play identified as important. Typically these extensions are based on static, domain-dependent knowledge. This paper describes a modification of brute-force search, singular extensions, that allows extensions to be identified in a dynamic, domain-independent, low-overhead manner. Singular extensions, when implemented in a chess-playing program, resulted in significant performance improvements. © 1990.
引用
收藏
页码:99 / 109
页数:11
相关论文
共 50 条
  • [31] Hidden Markov Model Modeling of SSH Brute-Force Attacks
    Sperotto, Anna
    Sadre, Ramin
    de Boer, Pieter-Tjerk
    Pras, Aiko
    INTEGRATED MANAGEMENT OF SYSTEMS, SERVICES, PROCESSES AND PEOPLE IN IT, PROCEEDINGS, 2009, 5841 : 164 - 176
  • [32] Smart brute-force approach for distribution feeder reconfiguration problem
    Parlier, Guillaume
    Gueguen, Herve
    Hu, Feihu
    ELECTRIC POWER SYSTEMS RESEARCH, 2019, 174
  • [33] Systolic parallel architecture for brute-force autoregressive signal modeling
    Alwan, Nuha A. S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (04) : 1358 - 1366
  • [34] LHC physicists embrace brute-force approach to particle hunt
    Davide Castelvecchi
    Nature, 2018, 560 (7718) : 293 - 294
  • [35] Local search for string problems: Brute-force is essentially optimal
    Guo, Jiong
    Hermelin, Danny
    Komusiewicz, Christian
    THEORETICAL COMPUTER SCIENCE, 2014, 525 : 30 - 41
  • [36] Towards Data-Driven Characterization of Brute-Force Attackers
    Wilkens, Florian
    Fischer, Mathias
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [37] A brute-force method for studying the chromatic properties of homeomorphic graphs
    Read, Ronald C.
    ARS COMBINATORIA, 2010, 96 : 425 - 457
  • [38] Brute-Force k-Nearest Neighbors Search on the GPU
    Li, Shengren
    Amenta, Nina
    SIMILARITY SEARCH AND APPLICATIONS, SISAP 2015, 2015, 9371 : 259 - 270
  • [39] REPRESENTATION DESIGN AND BRUTE-FORCE INDUCTION IN A BOEING MANUFACTURING DOMAIN
    RIDDLE, P
    SEGAL, R
    ETZIONI, O
    APPLIED ARTIFICIAL INTELLIGENCE, 1994, 8 (01) : 125 - 147
  • [40] Thoughtful brute-force attack of the RERS 2012 and 2013 Challenges
    Jaco van de Pol
    Theo C. Ruys
    Steven te Brinke
    International Journal on Software Tools for Technology Transfer, 2014, 16 : 481 - 491