Skip to main content

Controlled Conspiracy-2 Search

Extended Abstract

  • Conference paper
  • First Online:
STACS 2000 (STACS 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1770))

Included in the following conference series:

Abstract

When playing board games like chess, checkers, othello etc., computers use game tree search algorithms to evaluate a position. The greatest success of game tree search so far, has been the victory of the chess machine ‘Deep Blue’ vs. G. Kasparov, the best human chess player in the world.

When a game tree is too large to be examined exhaustively, the standard method for computers to play games is as follows. A partial game tree (envelope) is chosen for examination. This partial game tree may be any subtree of the complete game tree, rooted at the starting position. It is explored by the help of the αβ-algorithm, or any of its variants. All αβ-variants have in common that a single faulty leaf evaluation may cause a wrong decision at the root.

To overcome this insecurity, we propose Cc2s, a new algorithm, which selects an envelope in a way that the decision at the root is stable against a single faulty evaluation. At the same time, it examines this envelope efficiently. We describe the algorithm and analyze its time behavior and correctness. Moreover, we are presenting some experimental results from the domain of chess.

Cc2s is used in the parallel chess program P.ConNerS, which won the 8th International Paderborn Computer Chess Championship 1999.

This work was supported by the DFG research project “Selektive Suchverfahren” under grant Mo 285/12-3.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. de Bruin A. Plaat, J. Schaeffer and W. Pijls. A minimax Algorithm better than SSS*. Artificial Intelligence, 87:255–293, 1999.

    Google Scholar 

  2. T.S. Anantharaman. Extension heuristics. ICCA Journal, 14(2):47–63, 1991.

    MathSciNet  Google Scholar 

  3. D.F. Beal. Experiments with the null move. Advances in Computer Chess 5 (ed. Beal, D.F.), pages 65–79, 1989.

    Google Scholar 

  4. H. Bednorz and F. Tönissen. Der neue Bednorz-Tönissen-Test. Computer Schach und Spiele, 11(2):24–27, 1994.

    Google Scholar 

  5. H. Berliner. The B* tree search algorithm: A best-first proof procedure. Artificial Intelligence, 12(1):23–40, 1979.

    Article  MathSciNet  Google Scholar 

  6. C. Donninger. Null move and deep search. ICCA Journal, 16(3):137–143, 1993.

    Google Scholar 

  7. R. Feldmann. Fail high reductions. Advances in Computer Chess 8 (ed. J. van den Herik), 1996.

    Google Scholar 

  8. D.E. Knuth and R.W. Moore. An analysis of alpha-beta pruning. Artificial Intelligence, 6(4):293–326, 1975.

    Article  MATH  MathSciNet  Google Scholar 

  9. U. Lorenz. Controlled conspiracy-2 search. Technical report, University of Paderborn, available via http://www.upb.de/cs/agmonien/PERSONAL/FLULO/publications.html, 1999.

  10. U. Lorenz and B. Monien. The secret of selective game tree search, when using random-error evaluations. Technical report, University of Paderborn, available via http://www.upb.de/cs/ag-monien/PERSONAL/FLULO/publications.html, 1998.

  11. U. Lorenz, V. Rottmann, R. Feldmann, and P. Mysliwietz. Controlled conspiracy number search. ICCA Journal, 18(3):135–147, 1995.

    Google Scholar 

  12. T.A. Marsland, A. Reinefeld, and J. Schaeffer. Low overhead alternatives to SSS*. Artificial Intelligence, 31(1):185–199, 1987.

    Article  Google Scholar 

  13. D.A. McAllester. Conspiracy Numbers for Min-Max searching. Artificial Intelligence, 35(1):287–310, 1988.

    Article  MATH  MathSciNet  Google Scholar 

  14. A.J. Palay. Searching with Probabilities. 1985.

    Google Scholar 

  15. J. Pearl. Heuristics — Intelligent Search Strategies for Computer Problem Solving. Addison-Wesley Publishing Co., Reading, MA, 1984.

    Google Scholar 

  16. R.L. Rivest. Game tree searching by min/max approximation. Artificial Intelligence, 34(1):77–96, 1987.

    Article  MATH  MathSciNet  Google Scholar 

  17. J. Schaeffer. The history heuristic. ICCA Journal, 6(3):16–19, 1983.

    Google Scholar 

  18. J. Schaeffer. Conspiracy numbers. Artificial Intelligence, 43(1):67–84, 1990.

    Article  Google Scholar 

  19. G.C. Stockman. A minimax algorithm better than alpha-beta? Artificial Intelligence, 12(2):179–196, 1979.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lorenz, U. (2000). Controlled Conspiracy-2 Search. In: Reichel, H., Tison, S. (eds) STACS 2000. STACS 2000. Lecture Notes in Computer Science, vol 1770. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46541-3_39

Download citation

  • DOI: https://doi.org/10.1007/3-540-46541-3_39

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67141-1

  • Online ISBN: 978-3-540-46541-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics