Towards Strategic Kriegspiel Play with Opponent Modeling
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Bibliography of Traditional Board Games
Bibliography of Traditional Board Games Damian Walker Introduction The object of creating this document was to been very selective, and will include only those provide an easy source of reference for my fu- passing mentions of a game which give us use- ture projects, allowing me to find information ful information not available in the substan- about various traditional board games in the tial accounts (for example, if they are proof of books, papers and periodicals I have access an earlier or later existence of a game than is to. The project began once I had finished mentioned elsewhere). The Traditional Board Game Series of leaflets, The use of this document by myself and published on my web site. Therefore those others has been complicated by the facts that leaflets will not necessarily benefit from infor- a name may have attached itself to more than mation in many of the sources below. one game, and that a game might be known Given the amount of effort this document by more than one name. I have dealt with has taken me, and would take someone else to this by including every name known to my replicate, I have tidied up the presentation a sources, using one name as a \primary name" little, included this introduction and an expla- (for instance, nine mens morris), listing its nation of the \families" of board games I have other names there under the AKA heading, used for classification. and having entries for each synonym refer the My sources are all in English and include a reader to the main entry. -
A Heuristic Algorithm for Kriegspiel
Master Thesis Czech Technical University in Prague Faculty of Electrical Engineering F3 Department of Computer Science A Heuristic Algorithm for Kriegspiel Bc. Vojtěch Foret Supervisor: Ing. Michal Šustr May 2021 ctuthesis t1606152353 ii MASTER‘S THESIS ASSIGNMENT I. Personal and study details Student's name: Foret Vojtěch Personal ID number: 456991 Faculty / Institute: Faculty of Electrical Engineering Department / Institute: Department of Computer Science Study program: Open Informatics Specialisation: Artificial Intelligence II. Master’s thesis details Master’s thesis title in English: A heuristic algorithm for Kriegspiel Master’s thesis title in Czech: Heuristický algoritmus pro Kriegspiel Guidelines: 1. Make a literature overview of algorithms for solving large games of imperfect information, with the emphasis on Kriegspiel [1]. 2. Implement the game and reimplement a state-of-the art algorithm [2] as a baseline in OpenSpiel [3]. 3. Implement a new algorithm, based on sampling compatible boards [4] and evaluating them with a traditional chess engine [5] as a heuristic for the value function. 4. Evaluate the algorithms in pair-wise matches to compute a statistically significant result. Bibliography / sources: [1] Li, David Hsiang-fu. Kriegspiel: Chess Under Uncertainty. Premier Publishing Company, 1994. [2] Paolo Ciancarini, Gian Piero Favini, Monte Carlo tree search in Kriegspiel, Artificial Intelligence, Volume 174, Issue 11, Pages 670-684, 2010. [3] Lanctot M, Lockhart E, Lespiau JB, Zambaldi V, Upadhyay S, Pérolat J, Srinivasan S, Timbers F, Tuyls K, Omidshafiei S, Hennes D. OpenSpiel: A framework for reinforcement learning in games. arXiv preprint arXiv:1908.09453. 2019 Aug 26. [4] Ciancarini P, Favini GP. Representing Kriegspiel States with Metapositions. -
CS 297 Report Improving Chess Program Encoding Schemes
CS 297 Report Improving Chess Program Encoding Schemes Supriya Basani ([email protected]) Advisor: Dr. Chris Pollett Department of Computer Science San Jose State University December 2006 Table of Contents: Introduction......................................................................................................................... 3 Deliverable 1:...................................................................................................................... 4 Chess Game Databases and GNU Chess Program ......................................................... 4 Book.dat generation algorithm: .................................................................................. 5 Database lookup algorithm: ........................................................................................ 6 Deliverable 2:...................................................................................................................... 7 GNU Chess program's PVS Algorithm .......................................................................... 7 PVS algorithm:............................................................................................................ 8 Deliverable 3:.................................................................................................................... 10 Extension to PVS algorithm and Auto play setup ........................................................ 10 1. Extension to PVS algorithm.................................................................................. 10 2. Autoplay Setup................................................................................................. -
The GNU C Programming Tutorial
Edition 4.1 The GNU C Programming Tutorial Mark Burgess Faculty of Engineering, Oslo College Ron Hale-Evans Copyright c 2002 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; there being no Invariant Section, with the Front-Cover Texts being \A GNU Manual", and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled \GNU Free Documentation License". (a) The FSF's Back-Cover Text is: \You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development." Function pointers i Table of Contents Preface ...................................... xi 1 Introduction............................... 1 1.1 The advantages of C..................................... 1 1.2 Questions for Chapter 1 ................................. 2 2 Using a compiler........................... 3 2.1 Basic ideas about C ..................................... 3 2.2 The compiler ........................................... 4 2.3 File names .............................................. 4 2.4 Errors .................................................. 5 2.4.1 Typographical errors ............................ 6 2.4.2 Type errors .................................... 6 2.5 Questions for Chapter 2 ................................. 6 3 The form of a C program................... 9 -
Dutchman Who Did Not Drink Beer. He Also Surprised My Wife Nina by Showing up with Flowers at the Lenox Hill Hospital Just Before She Gave Birth to My Son Mitchell
168 The Bobby Fischer I Knew and Other Stories Dutchman who did not drink beer. He also surprised my wife Nina by showing up with flowers at the Lenox Hill Hospital just before she gave birth to my son Mitchell. I hadn't said peep, but he had his quiet ways of finding out. Max was quiet in another way. He never discussed his heroism during the Nazi occupation. Yet not only did he write letters to Alekhine asking the latter to intercede on behalf of the Dutch martyrs, Dr. Gerard Oskam and Salo Landau, he also put his life or at least his liberty on the line for several others. I learned of one instance from Max's friend, Hans Kmoch, the famous in-house annotator at AI Horowitz's Chess Review. Hans was living at the time on Central Park West somewhere in the Eighties. His wife Trudy, a Jew, had constant nightmares about her interrogations and beatings in Holland by the Nazis. Hans had little money, and Trudy spent much of the day in bed screaming. Enter Nina. My wife was working in the New York City welfare system and managed to get them part-time assistance. Hans then confided in me about how Dr. E greased palms and used his in fluence to save Trudy's life by keeping her out of a concentration camp. But mind you, I heard this from Hans, not from Dr. E, who was always Max the mum about his good deeds. Mr. President In 1970, Max Euwe was elected president of FIDE, a position he held until 1978. -
Chapter 15, New Pieces
Chapter 15 New pieces (2) : Pieces with limited range [This chapter covers pieces whose range of movement is limited, in the same way that the moves of the king and knight are limited in orthochess.] 15.1 Pieces which can move only one square [The only such piece in orthochess is the king, but the ‘wazir’ (one square orthogonally in any direction), ‘fers’ or ‘firzan’ (one square diagonally in any direction), ‘gold general’ (as wazir and also one square diagonally forward), and ‘silver general’ (as fers and also one square orthogonally forward), have been widely used and will be found in many of the games in the chapters devoted to historical and regional versions of chess. Some other flavours will be found below. In general, games which involve both a one-square mover and ‘something more powerful’ will be found in the section devoted to ‘something more powerful’, but the two later developments of ‘Le Jeu de la Guerre’ are included in this first section for convenience. One-square movers are slow and may seem to be weak, but even the lowly fers can be a potent attacking weapon. ‘Knight for two pawns’ is rarely a good swap, but ‘fers for two pawns’ is a different matter, and a sound tactic, when unobservant defence permits it, is to use the piece with a fers move to smash a hole in the enemy pawn structure so that other men can pour through. In xiangqi (Chinese chess) this piece is confined to a defensive role by the rules of the game, but to restrict it to such a role in other forms of chess may well be a losing strategy.] Le Jeu de la Guerre [M.M.] (‘M.M.’, ranks 1/11, CaHDCuGCaGCuDHCa on ranks perhaps J. -
Unix Et Programmation Shell
Unix et Programmation Shell Philippe Langevin d´epartment d'informatique UFR sciences et technique universit´edu sud Toulon Var Automne 2013 Philippe Langevin (imath/ustv) Unix et Programmation Shell Automne 2013 1 / 33 document brouillon en r´evision site du cours : http://langevin.univ-tln.fr/cours/UPS/upsh.html localisation du fichier : http://langevin.univ-tln.fr/cours/UPS/doc/file.pdf Philippe Langevin (imath/ustv) Unix et Programmation Shell Automne 2013 2 / 33 derni`eresmodifications man.tex 2017−09−07 12:27:47.738251920 +0200 perm.tex 2016−09−30 09:41:54.766553521 +0200 file .tex 2016−09−30 09:19:02.810595120 +0200 bash.tex 2016−09−15 12:09:09.887948313 +0200 term.tex 2016−09−14 18:50:05.124091515 +0200 upsh.tex 2015−10−25 18:09:36.027434338 +0100 proc.tex 2015−10−20 22:09:35.450391618 +0200 shell.tex 2015−09−10 19:31:04.581529236 +0200 prologue.tex 2015−09−07 09:06:31.773157847 +0200 tools.tex 2015−07−11 09:04:38.890915266 +0200 pipe.tex 2014−10−02 19:10:22.426127326 +0200 direct.tex 2014−10−02 07:49:17.162784238 +0200 syntaxe.tex 2014−10−01 23:52:29.859357485 +0200 part.tex 2014−10−01 23:52:29.372363438 +0200 Philippe Langevin (imath/ustv) Unix et Programmation Shell Automne 2013 3 / 33 fichier 4 - fichier structure I-noeud commande fichier r´epertoire tube nomm´e netcat commande r´eseau Philippe Langevin (imath/ustv) Unix et Programmation Shell Automne 2013 4 / 33 fichier structure structure g´en´erale L'ensemble des syst`emesde fichiers d'un syst`eme unix est un arbre enracin´edans r´epertoire / . -
UC Santa Cruz UC Santa Cruz Electronic Theses and Dissertations
UC Santa Cruz UC Santa Cruz Electronic Theses and Dissertations Title Embedding Security into Systems After Their Design Permalink https://escholarship.org/uc/item/1vn6v7wg Author Capelis, D J Publication Date 2015 License https://creativecommons.org/licenses/by/4.0/ 4.0 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA SANTA CRUZ EMBEDDING SECURITY INTO SYSTEMS AFTER THEIR DESIGN A dissertation submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in COMPUTER SCIENCE by D J Capelis September 2015 The dissertation of D J Capelis is approved: Darrell DE Long, Chair Ethan L Miller Ahmed Amer Tyrus Miller Vice Provost and Dean of Graduate Studies Table of Contents Abstract v Acknowledgments vii 1 Introduction 1 1.1 New Possibilities . 2 1.2 Ease of Deployment . 2 1.3 Consolidation . 3 1.4 Consistency . 5 2 Changing Networking 7 2.1 Related Work . 10 2.2 Technical Detail . 13 2.2.1 Core Services . 13 2.2.2 Session Initiator . 21 2.3 Performance . 21 2.4 Potential Improvements . 24 2.4.1 Integration into the Kernel . 24 2.4.2 Integration into Hardware . 25 2.5 Deployment . 25 2.5.1 Deploying with Unmodified Applications . 26 2.5.2 Deploying with Unmodified Computers . 26 3 Changing the Computer Organization 28 3.1 Goals . 29 3.2 Related Work . 31 3.3 Technical Design . 33 3.3.1 Trusted Loading . 35 3.3.2 Trusted Data . 37 3.3.3 Trusted Runtime . 39 3.3.4 Trusted Channels . -
Linux Installation and Getting Started
Linux Installation and Getting Started Copyright c 1992–1996 Matt Welsh Version 2.3, 22 February 1996. This book is an installation and new-user guide for the Linux system, meant for UNIX novices and gurus alike. Contained herein is information on how to obtain Linux, installation of the software, a beginning tutorial for new UNIX users, and an introduction to system administration. It is meant to be general enough to be applicable to any distribution of the Linux software. This book is freely distributable; you may copy and redistribute it under certain conditions. Please see the copyright and distribution statement on page xiii. Contents Preface ix Audience ............................................... ix Organization.............................................. x Acknowledgments . x CreditsandLegalese ......................................... xii Documentation Conventions . xiv 1 Introduction to Linux 1 1.1 About This Book ........................................ 1 1.2 A Brief History of Linux .................................... 2 1.3 System Features ......................................... 4 1.4 Software Features ........................................ 5 1.4.1 Basic commands and utilities ............................. 6 1.4.2 Text processing and word processing ......................... 7 1.4.3 Programming languages and utilities .......................... 9 1.4.4 The X Window System ................................. 10 1.4.5 Networking ....................................... 11 1.4.6 Telecommunications and BBS software ....................... -
Monte Carlo Tree Search in Kriegspiel ∗ Paolo Ciancarini , Gian Piero Favini
Artificial Intelligence 174 (2010) 670–684 Contents lists available at ScienceDirect Artificial Intelligence www.elsevier.com/locate/artint Monte Carlo tree search in Kriegspiel ∗ Paolo Ciancarini , Gian Piero Favini Dipartimento di Scienze dell’Informazione, University of Bologna, Italy article info abstract Article history: Partial information games are excellent examples of decision making under uncertainty. In Received 20 September 2009 particular, some games have such an immense state space and high degree of uncertainty Received in revised form 4 April 2010 that traditional algorithms and methods struggle to play them effectively. Monte Carlo tree Accepted 4 April 2010 search (MCTS) has brought significant improvements to the level of computer programs Available online 9 April 2010 in games such as Go, and it has been used to play partial information games as well. Keywords: However, there are certain games with particularly large trees and reduced information Games in which a naive MCTS approach is insufficient: in particular, this is the case of games Chess with long matches, dynamic information, and complex victory conditions. In this paper we Kriegspiel explore the application of MCTS to a wargame-like board game, Kriegspiel. We describe and Incomplete information study three MCTS-based methods, starting from a very simple implementation and moving Monte Carlo tree search to more refined versions for playing the game with little specific knowledge. We compare these MCTS-based programs to the strongest known minimax-based Kriegspiel program, obtaining significantly better experimental results with less domain-specific knowledge. © 2010 Elsevier B.V. All rights reserved. 1. Introduction Partial information games provide a good model and testbed for many real-world situations involving decision mak- ing under uncertainty. -
De-Sign and Implementation of a Computer Vision System for an Au
Journal of Computer Science & Technology, Volume 18, Number 1, April 2018 - ORIGINAL ARTICLE - Design and Implementation of a Computer Vision System for an Autonomous Chess-Playing Robot Guillermo Larregay1, Federico Pinna1, Luis Avila1,2, and Daniel Mor´an1 1Laboratorio de Mecatr´onica, Universidad Nacional de San Luis, Villa Mercedes, San Luis, Argentina. 2Laboratorio de Investigaci´on y Desarrollo en Inteligencia Computacional, Universidad Nacional de San Luis, San Luis, Argentina. {golarregay, fpinna, loavila, dmoran}@unsl.edu.ar Abstract chess in an autonomous manner against a human op- ponent. This work describes a mechatronic system composed Briefly, this implementation is based on an by a robot arm that can play chess autonomously. The industrial-grade robot manipulator, a computer vision system is based on an industrial-grade robot manipu- system, and an open source chess game engine. The lator, a computer vision system, and an open source chess engine, based on the GNU Chess open source chess engine. Classification algorithms were imple- package, is used as the back-end engine for the chess mented in order to detect whether a given chessboard game. In order to achieve a proper and uniform level square is occupied, and in that case, if the piece is of illumination on the chessboard surface, a theoret- black or white. Such algorithms were compared in ical model of the illuminance curve of an LED was terms of their complexity of implementation, execu- used as the evaluation function for a genetic algo- tion time and accuracy of predictions. To achieve an rithm, implemented to optimize each LED orienta- uniform illumination of the chessboard, a theoretical tion using heuristic techniques so as to uniformly dis- model of an LED illuminance curve was used to find tribute the average illumination over the chessboard the best orientation for each diode using a genetic al- surface. -
Simple Computer Vision System for Chess Playing Robot Manipulator As a Project-Based Learning Example
Simple computer vision system for chess playing robot manipulator as a Project-based learning example Emir Sokic, Melita Ahic-Djokic Faculty of Electrical Engineering, University of Sarajevo Zmaja od Bosne bb, 71000 Sarajevo, Bosnia and Herzegovina [email protected], [email protected] Abstract— This paper presents an example of project-based learn- course material is learned through homework problems and ing (PBL) in an undergraduate course on Image processing. The de- study prior to an exam. Evaluation of learning is based on sign of a simple, low-cost computer vision system for implementation project solutions, the method and presentation of solutions, on a chess-playing capable robot is discussed. The system is based on a standard CCD camera and a personal computer. This project and possibly a final examination [2]. is a good tool for learning most of the course material that would This paper proposes an adequate example of Project-based otherwise be mastered by homework problems and study before an learning intended to be part of an Image processing undergrad- exam. uate course. The example is interesting because it incorporates An algorithm which detects chess moves is proposed. It compares most of the topics discussed in the course: image representa- two or more frames captured before, during and after a played chess move, and finds differences between them, which are used to define a tion and display, image histograms, contrast and brightness played chess move. Further image processing is required to eliminate enhancement, histograms equalization, color transformations, false readings, recognize direction of chess moves, end eliminate image resizing, interpolation, affine and higher-order spatial image distortion.