- 1、本文档共6页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Lambda Depth-first Proof Number Search and its Application to Go
Lambda Depth-first Proof Number Search and its Application to Go
Kazuki Yoshizoe
Dept. of Electrical, Electronic,
and Communication Engineering,
Chuo University, Japan
yoshizoe@is.s.u-tokyo.ac.jp
Akihiro Kishimoto
Department of Media Architecture,
Future University-Hakodate, Japan
kishi@fun.ac.jp
Martin Mu?ller
Dept. of Computing Science,
University of Alberta, Canada
mmueller@cs.ualberta.ca
Abstract
Thomsen’s λ search and Nagai’s depth-first proof-
number (DFPN) search are two powerful but very
different AND/OR tree search algorithms. Lambda
Depth-First Proof Number search (LDFPN) is a
novel algorithm that combines ideas from both
algorithms. λ search can dramatically reduce a
search space by finding different levels of threat
sequences. DFPN employs the notion of proof
and disproof numbers to expand nodes expected
to be easiest to prove or disprove. The method
was shown to be effective for many games. Inte-
grating λ order with proof and disproof numbers
enables LDFPN to select moves more effectively,
while preserving the efficiency of DFPN. LDFPN
has been implemented for capturing problems in
Go and is shown to be more efficient than DFPN
and more robust than an algorithm based on classi-
cal λ search.
1 Introduction
Many search methods have been developed to solve com-
plex AND/OR trees, as occur in games. The direction of
search can be controlled in an ad hoc manner by domain-
specific knowledge. Domain-independent best-first, nonuni-
form tree expansion techniques are a more principled ap-
proach. Research in this area has produced two families of
algorithms: in the first family of algorithms based on proof
and disproof numbers [Allis, 1994; Nagai, 2002; Kishimoto
and Mu?ller, 2005], search is controlled through the combined
estimated difficulty of solving sets of frontier nodes that must
be (dis-)proven in order to (dis-)prove the root. The second
family of algorithms utilizes null (pass) moves [Donninger,
1993] for finding threats to achieve a goal [Thomsen,
您可能关注的文档
- Hubs, Nodes, and Bypassed Places A Typology of E-commerce Regions in the United States.pdf
- Huawei NE40E-X1X2 Router Brief Product Brochure (13-Jul-2012).pdf
- HybirdPath帮助文档.pdf
- Hunting for CP violation with untagged charm decays.pdf
- HW_U4B4(教师版).doc
- Human Leptin Instant ELISA.pdf
- Hydrogenation of brown coal. 2. Iron-based catalysis.pdf
- Hypoxic-Ischemic Encephalopathy in Preterm Infants.pdf
- IABP的使用说明书(英文版).pdf
- I have breakfast at seven o’clock.ppt
最近下载
- 痕迹检验复习试题有答案.doc
- 未成年人充值退款起诉书.docx VIP
- 2025年中国移动校园招聘考试笔试题库历年考试试题及答案.docx VIP
- 定量CT在健康管理中的应用指南(2024).pdf
- 《网约车运营管理》教学课件4-5 潜在客户分析及客户忠诚度提升.ppt VIP
- 排水泵房安全检查表.docx
- 我国实现双碳目标面临的现实挑战与对策建议.docx VIP
- 农技指导油菜机械化播栽与收获技术.pdf
- 第15课+列强入侵与中国人民的反抗斗争【中职专用】《中国历史》(高教版2023基础模块)-20240416165039.pptx
- 仁爱八年级下册Unit6Topic3SectionC优质公开课.ppt VIP
文档评论(0)