SINGULAR EXTENSIONS - ADDING SELECTIVITY TO BRUTE-FORCE SEARCHING

被引:46
|
作者
ANANTHARAMAN, T
CAMPBELL, MS
HSU, FH
机构
[1] Department of Computer Science, Carnegie-Mellon University, Pittsburgh
关键词
D O I
10.1016/0004-3702(90)90073-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Brute-force alpha-beta search of games trees has proven relatively effective in numerous domains. In order to further improve performance, many brute-force game-playing programs have used the technique of selective deepening, searching more deeply on lines of play identified as important. Typically these extensions are based on static, domain-dependent knowledge. This paper describes a modification of brute-force search, singular extensions, that allows extensions to be identified in a dynamic, domain-independent, low-overhead manner. Singular extensions, when implemented in a chess-playing program, resulted in significant performance improvements. © 1990.
引用
收藏
页码:99 / 109
页数:11
相关论文
共 50 条
  • [41] Research on techniques for detecting brute-force attacks on corporate email
    Liu, Xiaomei
    Hu, Xuewei
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2024, 24 (03) : 1379 - 1393
  • [42] Privacy-Preserving Outsourcing of Brute-Force Key Searches
    Karame, Ghassan O.
    Capkun, Srdjan
    Maurer, Ueli
    PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), 2011, : 101 - 112
  • [43] Transport and imaging of brute-force 13C hyperpolarization
    Hirsch, Matthew L.
    Smith, Bryce A.
    Mattingly, Mark
    Goloshevsky, Artem G.
    Rosay, Melanie
    Kempf, James G.
    JOURNAL OF MAGNETIC RESONANCE, 2015, 261 : 87 - 94
  • [44] BRUTE-FORCE NUCLEAR ORIENTATION - SURVEY OF ACCOMPLISHMENTS AND PROBLEMS TO DATE
    BREWER, WD
    JOURNAL OF LOW TEMPERATURE PHYSICS, 1977, 27 (5-6) : 651 - 682
  • [45] GenoGuard: Protecting Genomic Data against Brute-Force Attacks
    Huang, Zhicong
    Ayday, Erman
    Fellay, Jacques
    Hubaux, Jean-Pierre
    Juels, Ari
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 447 - 462
  • [46] A SURVEY OF RUSSIAN APPROACHES TO PEREBOR (BRUTE-FORCE SEARCH) ALGORITHMS
    TRAKHTENBROT, BA
    ANNALS OF THE HISTORY OF COMPUTING, 1984, 6 (04): : 384 - 399
  • [47] 数据结构Brute-Force算法的实现
    郑盼盼
    电子制作, 2014, (06) : 85 - 86
  • [48] Thoughtful brute-force attack of the RERS 2012 and 2013 Challenges
    van de Pol, Jaco
    Ruys, Theo C.
    te Brinke, Steven
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2014, 16 (05) : 481 - 491
  • [49] An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario
    Molter, H. Gregor
    Ogata, Kei
    Tews, Erik
    Weinmann, Ralf-Philipp
    ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS, 2009, : 82 - +
  • [50] A Brute-Force Algorithm for Reconstructing a Scene from Two Projections
    Enqvist, Olof
    Jiang, Fangyuan
    Kahl, Fredrik
    2011 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2011,