Adversarial Search. Christos Papaloukas, Iosif Angelidis. University of Athens November 2017

Size: px
Start display at page:

Download "Adversarial Search. Christos Papaloukas, Iosif Angelidis. University of Athens November 2017"

Transcription

1 Adversarial Search Christos Papaloukas, Iosif Angelidis University of Athens November 2017 Christos P., Iosif A. Adversarial Search UoA, / 61

2 Main Aspects Formulation In order to perform an Adversarial Search, the following components are required: S 0 : the initial state. Successor function: yields a list of (move, state) pairs. Terminal-test(S): game over for S? Utility function: Also known as objective function. Gives a numerical value for terminal states. Result(S, a): the potential estimation of performing a certain action. Consider 2 players, MAX and MIN, assumming that MAX starts first (otherwise the inverse logic of our discussion holds). Christos P., Iosif A. Adversarial Search UoA, / 61

3 Christos P., Iosif A. Adversarial Search UoA, / 61

4 Pseudocode MAX a: MAX s best option on path to root d e f max_value ( s t a t e, a, b ) : i n i t i a l i z e v = f o r s u c c e s s o r i n s t a t e. s u c c e s s o r s : v = max( v a l u e ( s u c c e s s o r, a, b ) ) i f v > b : r e t u r n v a = max( a, v ) r e t u r n v Christos P., Iosif A. Adversarial Search UoA, / 61

5 Pseudocode MIN b: MIN s best option on path to root d e f min_value ( s t a t e, a, b ) : i n i t i a l i z e v = + f o r s u c c e s s o r i n s t a t e. s u c c e s s o r s : v = min ( v a l u e ( s u c c e s s o r, a, b ) ) i f v < a : r e t u r n v b = min ( b, v ) r e t u r n v Christos P., Iosif A. Adversarial Search UoA, / 61

6 Example 1 (1/38) Christos P., Iosif A. Adversarial Search UoA, / 61

7 Example 1 (2/38) Christos P., Iosif A. Adversarial Search UoA, / 61

8 Example 1 (3/38) Christos P., Iosif A. Adversarial Search UoA, / 61

9 Example 1 (4/38) Christos P., Iosif A. Adversarial Search UoA, / 61

10 Example 1 (5/38) Christos P., Iosif A. Adversarial Search UoA, / 61

11 Example 1 (6/38) Christos P., Iosif A. Adversarial Search UoA, / 61

12 Example 1 (7/38) Christos P., Iosif A. Adversarial Search UoA, / 61

13 Example 1 (8/38) Christos P., Iosif A. Adversarial Search UoA, / 61

14 Example 1 (9/38) Christos P., Iosif A. Adversarial Search UoA, / 61

15 Example 1 (10/38) Christos P., Iosif A. Adversarial Search UoA, / 61

16 Example 1 (11/38) Christos P., Iosif A. Adversarial Search UoA, / 61

17 Example 1 (12/38) Christos P., Iosif A. Adversarial Search UoA, / 61

18 Example 1 (13/38) Christos P., Iosif A. Adversarial Search UoA, / 61

19 Example 1 (14/38) Christos P., Iosif A. Adversarial Search UoA, / 61

20 Example 1 (15/38) Christos P., Iosif A. Adversarial Search UoA, / 61

21 Example 1 (16/38) Christos P., Iosif A. Adversarial Search UoA, / 61

22 Example 1 (17/38) Christos P., Iosif A. Adversarial Search UoA, / 61

23 Example 1 (18/38) Christos P., Iosif A. Adversarial Search UoA, / 61

24 Example 1 (19/38) Christos P., Iosif A. Adversarial Search UoA, / 61

25 Example 1 (20/38) Christos P., Iosif A. Adversarial Search UoA, / 61

26 Example 1 (21/38) Christos P., Iosif A. Adversarial Search UoA, / 61

27 Example 1 (22/38) Christos P., Iosif A. Adversarial Search UoA, / 61

28 Example 1 (23/38) Christos P., Iosif A. Adversarial Search UoA, / 61

29 Example 1 (24/38) Christos P., Iosif A. Adversarial Search UoA, / 61

30 Example 1 (25/38) Christos P., Iosif A. Adversarial Search UoA, / 61

31 Example 1 (26/38) Christos P., Iosif A. Adversarial Search UoA, / 61

32 Example 1 (27/38) Christos P., Iosif A. Adversarial Search UoA, / 61

33 Example 1 (28/38) Christos P., Iosif A. Adversarial Search UoA, / 61

34 Example 1 (29/38) Christos P., Iosif A. Adversarial Search UoA, / 61

35 Example 1 (30/38) Christos P., Iosif A. Adversarial Search UoA, / 61

36 Example 1 (31/38) Christos P., Iosif A. Adversarial Search UoA, / 61

37 Example 1 (32/38) Christos P., Iosif A. Adversarial Search UoA, / 61

38 Example 1 (33/38) Christos P., Iosif A. Adversarial Search UoA, / 61

39 Example 1 (34/38) Christos P., Iosif A. Adversarial Search UoA, / 61

40 Example 1 (35/38) Christos P., Iosif A. Adversarial Search UoA, / 61

41 Example 1 (36/38) Christos P., Iosif A. Adversarial Search UoA, / 61

42 Example 1 (37/38) Christos P., Iosif A. Adversarial Search UoA, / 61

43 Example 1 (38/38) Christos P., Iosif A. Adversarial Search UoA, / 61

44 Example 2 (1/3) Question Given the next zero-sum game, circle MAX s optimal next move on the graph and state the minimax value of the game. Explain. Christos P., Iosif A. Adversarial Search UoA, / 61

45 Example 2 (2/3) Christos P., Iosif A. Adversarial Search UoA, / 61

46 Example 2 (3/3) Christos P., Iosif A. Adversarial Search UoA, / 61

47 Example 3 (1/3) Question Same as example 2, with a-b pruning. Christos P., Iosif A. Adversarial Search UoA, / 61

48 Example 3 (2/3) Christos P., Iosif A. Adversarial Search UoA, / 61

49 Example 3 (3/3) Christos P., Iosif A. Adversarial Search UoA, / 61

50 Example 4 (1/4) Question Modify the previous game by giving the first leaf a value of X. Find the domain of X in which MAX will select the left action. Christos P., Iosif A. Adversarial Search UoA, / 61

51 Example 4 (2/4) Christos P., Iosif A. Adversarial Search UoA, / 61

52 Example 4 (3/4) Christos P., Iosif A. Adversarial Search UoA, / 61

53 Example 4 (4/4) Answer As long as 10 < X < 10, MIN will choose the action leading to X. Because the right branch has a value of 1, for any X > 1 (or X 1, also acceptable), MAX chooses left. Be careful! X 10. Even if X > 10, we still move left initially. X = 10. is equal to expectimax but we want it to be more. Christos P., Iosif A. Adversarial Search UoA, / 61

54 Example 1 (1/3) Question Same game as the previous examples, but MIN acts randomly in a uniform fashion. Circle MAX s optimal move, show the cost value and explain. Christos P., Iosif A. Adversarial Search UoA, / 61

55 Example 1 (2/3) Christos P., Iosif A. Adversarial Search UoA, / 61

56 Example 1 (3/3) Christos P., Iosif A. Adversarial Search UoA, / 61

57 Example 2 (1/4) Question Modify the previous game by giving the first leaf a value of X. Find the domain of X in which MAX will select the left action. Christos P., Iosif A. Adversarial Search UoA, / 61

58 Example 2 (2/4) Christos P., Iosif A. Adversarial Search UoA, / 61

59 Example 2 (3/4) Christos P., Iosif A. Adversarial Search UoA, / 61

60 Example 2 (4/4) Answer We need to compare 8 with 10+X 2. Proper calculations show that MAX will select the left action if X > 6 (or X 6, also acceptable). Christos P., Iosif A. Adversarial Search UoA, / 61

61 Thank you very much for your attention!

CS 188: Artificial Intelligence

CS 188: Artificial Intelligence CS 188: Artificial Intelligence Adversarial Search II Instructor: Anca Dragan University of California, Berkeley [These slides adapted from Dan Klein and Pieter Abbeel] Minimax Example 3 12 8 2 4 6 14

More information

Announcements. CS 188: Artificial Intelligence Spring Mini-Contest Winners. Today. GamesCrafters. Adversarial Games

Announcements. CS 188: Artificial Intelligence Spring Mini-Contest Winners. Today. GamesCrafters. Adversarial Games CS 188: Artificial Intelligence Spring 2009 Lecture 7: Expectimax Search 2/10/2009 John DeNero UC Berkeley Slides adapted from Dan Klein, Stuart Russell or Andrew Moore Announcements Written Assignment

More information

Announcements. CS 188: Artificial Intelligence Fall Adversarial Games. Computing Minimax Values. Evaluation Functions. Recap: Resource Limits

Announcements. CS 188: Artificial Intelligence Fall Adversarial Games. Computing Minimax Values. Evaluation Functions. Recap: Resource Limits CS 188: Artificial Intelligence Fall 2009 Lecture 7: Expectimax Search 9/17/2008 Announcements Written 1: Search and CSPs is up Project 2: Multi-agent Search is up Want a partner? Come to the front after

More information

CS 188: Artificial Intelligence Fall Announcements

CS 188: Artificial Intelligence Fall Announcements CS 188: Artificial Intelligence Fall 2009 Lecture 7: Expectimax Search 9/17/2008 Dan Klein UC Berkeley Many slides over the course adapted from either Stuart Russell or Andrew Moore 1 Announcements Written

More information

IS-ZC444: ARTIFICIAL INTELLIGENCE

IS-ZC444: ARTIFICIAL INTELLIGENCE IS-ZC444: ARTIFICIAL INTELLIGENCE Lecture-07: Beyond Classical Search Dr. Kamlesh Tiwari Assistant Professor Department of Computer Science and Information Systems, BITS Pilani, Pilani, Jhunjhunu-333031,

More information

Minimax strategies, alpha beta pruning. Lirong Xia

Minimax strategies, alpha beta pruning. Lirong Xia Minimax strategies, alpha beta pruning Lirong Xia Reminder ØProject 1 due tonight Makes sure you DO NOT SEE ERROR: Summation of parsed points does not match ØProject 2 due in two weeks 2 How to find good

More information

CS 188 Introduction to Fall 2007 Artificial Intelligence Midterm

CS 188 Introduction to Fall 2007 Artificial Intelligence Midterm NAME: SID#: Login: Sec: 1 CS 188 Introduction to Fall 2007 Artificial Intelligence Midterm You have 80 minutes. The exam is closed book, closed notes except a one-page crib sheet, basic calculators only.

More information

CS 4100 // artificial intelligence. Recap/midterm review!

CS 4100 // artificial intelligence. Recap/midterm review! CS 4100 // artificial intelligence instructor: byron wallace Recap/midterm review! Attribution: many of these slides are modified versions of those distributed with the UC Berkeley CS188 materials Thanks

More information

Evaluation for Pacman. CS 188: Artificial Intelligence Fall Iterative Deepening. α-β Pruning Example. α-β Pruning Pseudocode.

Evaluation for Pacman. CS 188: Artificial Intelligence Fall Iterative Deepening. α-β Pruning Example. α-β Pruning Pseudocode. CS 188: Artificial Intelligence Fall 2008 Evaluation for Pacman Lecture 7: Expectimax Search 9/18/2008 [DEMO: thrashing, smart ghosts] Dan Klein UC Berkeley Many slides over the course adapted from either

More information

CS 188: Artificial Intelligence Fall 2008

CS 188: Artificial Intelligence Fall 2008 CS 188: Artificial Intelligence Fall 2008 Lecture 7: Expectimax Search 9/18/2008 Dan Klein UC Berkeley Many slides over the course adapted from either Stuart Russell or Andrew Moore 1 1 Evaluation for

More information

CS 188 Introduction to AI Fall 2005 Stuart Russell Final

CS 188 Introduction to AI Fall 2005 Stuart Russell Final NAME: SID#: Section: 1 CS 188 Introduction to AI all 2005 Stuart Russell inal You have 2 hours and 50 minutes. he exam is open-book, open-notes. 100 points total. Panic not. Mark your answers ON HE EXAM

More information

Mock Exam Künstliche Intelligenz-1. Different problems test different skills and knowledge, so do not get stuck on one problem.

Mock Exam Künstliche Intelligenz-1. Different problems test different skills and knowledge, so do not get stuck on one problem. Name: Matriculation Number: Mock Exam Künstliche Intelligenz-1 January 9., 2017 You have one hour(sharp) for the test; Write the solutions to the sheet. The estimated time for solving this exam is 53 minutes,

More information

CSE 573: Artificial Intelligence

CSE 573: Artificial Intelligence CSE 573: Artificial Intelligence Autumn 2010 Lecture 5: Expectimax Search 10/14/2008 Luke Zettlemoyer Most slides over the course adapted from either Dan Klein, Stuart Russell or Andrew Moore 1 Announcements

More information

Introduction to Fall 2009 Artificial Intelligence Final Exam

Introduction to Fall 2009 Artificial Intelligence Final Exam CS 188 Introduction to Fall 2009 Artificial Intelligence Final Exam INSTRUCTIONS You have 3 hours. The exam is closed book, closed notes except a two-page crib sheet. Please use non-programmable calculators

More information

Summary. Agenda. Games. Intelligence opponents in game. Expected Value Expected Max Algorithm Minimax Algorithm Alpha-beta Pruning Simultaneous Game

Summary. Agenda. Games. Intelligence opponents in game. Expected Value Expected Max Algorithm Minimax Algorithm Alpha-beta Pruning Simultaneous Game Summary rtificial Intelligence and its applications Lecture 4 Game Playing Search onstraint Satisfaction Problems From start state to goal state onsider constraints Professor Daniel Yeung danyeung@ieee.org

More information

Final. CS 188 Fall Introduction to Artificial Intelligence

Final. CS 188 Fall Introduction to Artificial Intelligence S 188 Fall 2012 Introduction to rtificial Intelligence Final You have approximately 3 hours. The exam is closed book, closed notes except your three one-page crib sheets. Please use non-programmable calculators

More information

CS221 Practice Midterm

CS221 Practice Midterm CS221 Practice Midterm Autumn 2012 1 ther Midterms The following pages are excerpts from similar classes midterms. The content is similar to what we ve been covering this quarter, so that it should be

More information

Midterm. Introduction to Artificial Intelligence. CS 188 Summer You have approximately 2 hours and 50 minutes.

Midterm. Introduction to Artificial Intelligence. CS 188 Summer You have approximately 2 hours and 50 minutes. CS 188 Summer 2014 Introduction to Artificial Intelligence Midterm You have approximately 2 hours and 50 minutes. The exam is closed book, closed notes except your one-page crib sheet. Mark your answers

More information

Introduction to Fall 2008 Artificial Intelligence Midterm Exam

Introduction to Fall 2008 Artificial Intelligence Midterm Exam CS 188 Introduction to Fall 2008 Artificial Intelligence Midterm Exam INSTRUCTIONS You have 80 minutes. 70 points total. Don t panic! The exam is closed book, closed notes except a one-page crib sheet,

More information

Alpha-Beta Pruning: Algorithm and Analysis

Alpha-Beta Pruning: Algorithm and Analysis Alpha-Beta Pruning: Algorithm and Analysis Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Introduction Alpha-beta pruning is the standard searching procedure used for 2-person

More information

Game playing. Chapter 6. Chapter 6 1

Game playing. Chapter 6. Chapter 6 1 Game playing Chapter 6 Chapter 6 1 Outline Minimax α β pruning UCT for games Chapter 6 2 Game tree (2-player, deterministic, turns) Chapter 6 3 Minimax Perfect play for deterministic, perfect-information

More information

Final. Introduction to Artificial Intelligence. CS 188 Spring You have approximately 2 hours and 50 minutes.

Final. Introduction to Artificial Intelligence. CS 188 Spring You have approximately 2 hours and 50 minutes. CS 188 Spring 2014 Introduction to Artificial Intelligence Final You have approximately 2 hours and 50 minutes. The exam is closed book, closed notes except your two-page crib sheet. Mark your answers

More information

Scout, NegaScout and Proof-Number Search

Scout, NegaScout and Proof-Number Search Scout, NegaScout and Proof-Number Search Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Introduction It looks like alpha-beta pruning is the best we can do for a generic searching

More information

Microeconomics. 2. Game Theory

Microeconomics. 2. Game Theory Microeconomics 2. Game Theory Alex Gershkov http://www.econ2.uni-bonn.de/gershkov/gershkov.htm 18. November 2008 1 / 36 Dynamic games Time permitting we will cover 2.a Describing a game in extensive form

More information

Alpha-Beta Pruning: Algorithm and Analysis

Alpha-Beta Pruning: Algorithm and Analysis Alpha-Beta Pruning: Algorithm and Analysis Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Introduction Alpha-beta pruning is the standard searching procedure used for 2-person

More information

Alpha-Beta Pruning Under Partial Orders

Alpha-Beta Pruning Under Partial Orders More Games of No Chance MSRI Publications Volume 42, 2002 Alpha-Beta Pruning Under Partial Orders MATTHEW L. GINSBERG AND ALAN JAFFRAY Abstract. Alpha-beta pruning is the algorithm of choice for searching

More information

Alpha-Beta Pruning: Algorithm and Analysis

Alpha-Beta Pruning: Algorithm and Analysis Alpha-Beta Pruning: Algorithm and Analysis Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Introduction Alpha-beta pruning is the standard searching procedure used for solving

More information

Synthesis of Designs from Property Specifications

Synthesis of Designs from Property Specifications Synthesis of Designs from Property Specifications Amir Pnueli New York University and Weizmann Institute of Sciences FMCAD 06 San Jose, November, 2006 Joint work with Nir Piterman, Yaniv Sa ar, Research

More information

Speculative Parallelism in Cilk++

Speculative Parallelism in Cilk++ Speculative Parallelism in Cilk++ Ruben Perez & Gregory Malecha MIT May 11, 2010 Ruben Perez & Gregory Malecha (MIT) Speculative Parallelism in Cilk++ May 11, 2010 1 / 33 Parallelizing Embarrassingly Parallel

More information

Faster quantum algorithm for evaluating game trees

Faster quantum algorithm for evaluating game trees Faster quantum algorithm for evaluating game trees x 7 x 8 Ben Reichardt xx1 1 x 2 x 3 x 4 x 6 OR x 9 x1 1 x 5 x 9 University of Waterloo x 5 AND OR AND AND OR AND ϕ(x) x 7 x 8 x 1 x 2 x 3 x 4 x 6 OR x

More information

Equilibrium Points of an AND-OR Tree: under Constraints on Probability

Equilibrium Points of an AND-OR Tree: under Constraints on Probability Equilibrium Points of an AND-OR Tree: under Constraints on Probability Toshio Suzuki 1 Yoshinao Niida 2 Department of Math. and Information Sciences, Tokyo Metropolitan University, 1 The speaker, 2 Current

More information

Adversarial Search & Logic and Reasoning

Adversarial Search & Logic and Reasoning CSEP 573 Adversarial Search & Logic and Reasoning CSE AI Faculty Recall from Last Time: Adversarial Games as Search Convention: first player is called MAX, 2nd player is called MIN MAX moves first and

More information

Midterm Examination CS540: Introduction to Artificial Intelligence

Midterm Examination CS540: Introduction to Artificial Intelligence Midterm Examination CS540: Introduction to Artificial Intelligence November 1, 2005 Instructor: Jerry Zhu CLOSED BOOK (One letter-size notes allowed. Turn it in with the exam) LAST (FAMILY) NAME: FIRST

More information

Introduction to Spring 2009 Artificial Intelligence Midterm Exam

Introduction to Spring 2009 Artificial Intelligence Midterm Exam S 188 Introduction to Spring 009 rtificial Intelligence Midterm Exam INSTRUTINS You have 3 hours. The exam is closed book, closed notes except a one-page crib sheet. Please use non-programmable calculators

More information

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Thursday 17th May 2018 Time: 09:45-11:45. Please answer all Questions.

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Thursday 17th May 2018 Time: 09:45-11:45. Please answer all Questions. COMP 34120 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE AI and Games Date: Thursday 17th May 2018 Time: 09:45-11:45 Please answer all Questions. Use a SEPARATE answerbook for each SECTION

More information

CITS4211 Mid-semester test 2011

CITS4211 Mid-semester test 2011 CITS4211 Mid-semester test 2011 Fifty minutes, answer all four questions, total marks 60 Question 1. (12 marks) Briefly describe the principles, operation, and performance issues of iterative deepening.

More information

Searching in non-deterministic, partially observable and unknown environments

Searching in non-deterministic, partially observable and unknown environments Searching in non-deterministic, partially observable and unknown environments CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2014 Soleymani Artificial Intelligence:

More information

Lecture 23 Branch-and-Bound Algorithm. November 3, 2009

Lecture 23 Branch-and-Bound Algorithm. November 3, 2009 Branch-and-Bound Algorithm November 3, 2009 Outline Lecture 23 Modeling aspect: Either-Or requirement Special ILPs: Totally unimodular matrices Branch-and-Bound Algorithm Underlying idea Terminology Formal

More information

Properties of Forward Pruning in Game-Tree Search

Properties of Forward Pruning in Game-Tree Search Properties of Forward Pruning in Game-Tree Search Yew Jin Lim and Wee Sun Lee School of Computing National University of Singapore {limyewji,leews}@comp.nus.edu.sg Abstract Forward pruning, or selectively

More information

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet. CS 188 Fall 2015 Introduction to Artificial Intelligence Final You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

More information

Final. CS 188 Fall Introduction to Artificial Intelligence

Final. CS 188 Fall Introduction to Artificial Intelligence CS 188 Fall 2012 Introduction to Artificial Intelligence Final You have approximately 3 hours. The exam is closed book, closed notes except your three one-page crib sheets. Please use non-programmable

More information

Vector Spaces. 1 Theory. 2 Matlab. Rules and Operations

Vector Spaces. 1 Theory. 2 Matlab. Rules and Operations Vector Spaces Rules and Operations 1 Theory Recall that we can specify a point in the plane by an ordered pair of numbers or coordinates (x, y) and a point in space with an order triple of numbers (x,

More information

An Analysis of Forward Pruning. to try to understand why programs have been unable to. pruning more eectively. 1

An Analysis of Forward Pruning. to try to understand why programs have been unable to. pruning more eectively. 1 Proc. AAAI-94, to appear. An Analysis of Forward Pruning Stephen J. J. Smith Dana S. Nau Department of Computer Science Department of Computer Science, and University of Maryland Institute for Systems

More information

Sampling from Bayes Nets

Sampling from Bayes Nets from Bayes Nets http://www.youtube.com/watch?v=mvrtaljp8dm http://www.youtube.com/watch?v=geqip_0vjec Paper reviews Should be useful feedback for the authors A critique of the paper No paper is perfect!

More information

SF2972 Game Theory Written Exam with Solutions June 10, 2011

SF2972 Game Theory Written Exam with Solutions June 10, 2011 SF97 Game Theory Written Exam with Solutions June 10, 011 Part A Classical Game Theory Jörgen Weibull and Mark Voorneveld 1. Finite normal-form games. (a) What are N, S and u in the definition of a finite

More information

Decomposition of Multi-Player Games

Decomposition of Multi-Player Games EMCL Master Thesis Decomposition of Multi-Player Games Author: Dengji Zhao Advisor: Dipl.-Inf. Stephan Schiffel Supervisor: Prof. Dr. Michael Thielscher International Center for Computational Logic Technical

More information

Introduction to Spring 2009 Artificial Intelligence Midterm Solutions

Introduction to Spring 2009 Artificial Intelligence Midterm Solutions S 88 Introduction to Spring 009 rtificial Intelligence Midterm Solutions. (6 points) True/False For the following questions, a correct answer is worth points, no answer is worth point, and an incorrect

More information

of a bimatrix game David Avis McGill University Gabriel Rosenberg Yale University Rahul Savani University of Warwick

of a bimatrix game David Avis McGill University Gabriel Rosenberg Yale University Rahul Savani University of Warwick Finding all Nash equilibria of a bimatrix game David Avis McGill University Gabriel Rosenberg Yale University Rahul Savani University of Warwick Bernhard von Stengel London School of Economics Nash equilibria

More information

Appendix. Mathematical Theorems

Appendix. Mathematical Theorems Appendix Mathematical Theorems This appendix introduces some theorems required in the discussion in Chap. 5 of the asymptotic behavior of minimax values in Pb-game models. Throughout this appendix, b is

More information

CS221 Practice Midterm #2 Solutions

CS221 Practice Midterm #2 Solutions CS221 Practice Midterm #2 Solutions Summer 2013 Updated 4:00pm, July 24 2 [Deterministic Search] Pacfamily (20 points) Pacman is trying eat all the dots, but he now has the help of his family! There are

More information

Introduction to Spring 2006 Artificial Intelligence Practice Final

Introduction to Spring 2006 Artificial Intelligence Practice Final NAME: SID#: Login: Sec: 1 CS 188 Introduction to Spring 2006 Artificial Intelligence Practice Final You have 180 minutes. The exam is open-book, open-notes, no electronics other than basic calculators.

More information

Decision Trees. Lewis Fishgold. (Material in these slides adapted from Ray Mooney's slides on Decision Trees)

Decision Trees. Lewis Fishgold. (Material in these slides adapted from Ray Mooney's slides on Decision Trees) Decision Trees Lewis Fishgold (Material in these slides adapted from Ray Mooney's slides on Decision Trees) Classification using Decision Trees Nodes test features, there is one branch for each value of

More information

AI Programming CS S-06 Heuristic Search

AI Programming CS S-06 Heuristic Search AI Programming CS662-2013S-06 Heuristic Search David Galles Department of Computer Science University of San Francisco 06-0: Overview Heuristic Search - exploiting knowledge about the problem Heuristic

More information

Math 121 (Lesieutre); 9.1: Polar coordinates; November 22, 2017

Math 121 (Lesieutre); 9.1: Polar coordinates; November 22, 2017 Math 2 Lesieutre; 9: Polar coordinates; November 22, 207 Plot the point 2, 2 in the plane If you were trying to describe this point to a friend, how could you do it? One option would be coordinates, but

More information

Scout and NegaScout. Tsan-sheng Hsu.

Scout and NegaScout. Tsan-sheng Hsu. Scout and NegaScout Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Abstract It looks like alpha-beta pruning is the best we can do for an exact generic searching procedure.

More information

Lecture 20: PSPACE. November 15, 2016 CS 1010 Theory of Computation

Lecture 20: PSPACE. November 15, 2016 CS 1010 Theory of Computation Lecture 20: PSPACE November 15, 2016 CS 1010 Theory of Computation Recall that PSPACE = k=1 SPACE(nk ). We will see that a relationship between time and space complexity is given by: P NP PSPACE = NPSPACE

More information

Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen. Intelligent Data Analysis. Decision Trees

Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen. Intelligent Data Analysis. Decision Trees Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen Intelligent Data Analysis Decision Trees Paul Prasse, Niels Landwehr, Tobias Scheffer Decision Trees One of many applications:

More information

Before we show how languages can be proven not regular, first, how would we show a language is regular?

Before we show how languages can be proven not regular, first, how would we show a language is regular? CS35 Proving Languages not to be Regular Before we show how languages can be proven not regular, first, how would we show a language is regular? Although regular languages and automata are quite powerful

More information

Infinite Games. Sumit Nain. 28 January Slides Credit: Barbara Jobstmann (CNRS/Verimag) Department of Computer Science Rice University

Infinite Games. Sumit Nain. 28 January Slides Credit: Barbara Jobstmann (CNRS/Verimag) Department of Computer Science Rice University Infinite Games Sumit Nain Department of Computer Science Rice University 28 January 2013 Slides Credit: Barbara Jobstmann (CNRS/Verimag) Motivation Abstract games are of fundamental importance in mathematics

More information

Model-Checking Games: from CTL to ATL

Model-Checking Games: from CTL to ATL Model-Checking Games: from CTL to ATL Sophie Pinchinat May 4, 2007 Introduction - Outline Model checking of CTL is PSPACE-complete Presentation of Martin Lange and Colin Stirling Model Checking Games

More information

Learning in State-Space Reinforcement Learning CIS 32

Learning in State-Space Reinforcement Learning CIS 32 Learning in State-Space Reinforcement Learning CIS 32 Functionalia Syllabus Updated: MIDTERM and REVIEW moved up one day. MIDTERM: Everything through Evolutionary Agents. HW 2 Out - DUE Sunday before the

More information

6.207/14.15: Networks Lecture 16: Cooperation and Trust in Networks

6.207/14.15: Networks Lecture 16: Cooperation and Trust in Networks 6.207/14.15: Networks Lecture 16: Cooperation and Trust in Networks Daron Acemoglu and Asu Ozdaglar MIT November 4, 2009 1 Introduction Outline The role of networks in cooperation A model of social norms

More information

CSC242: Intro to AI. Lecture 7 Games of Imperfect Knowledge & Constraint Satisfaction

CSC242: Intro to AI. Lecture 7 Games of Imperfect Knowledge & Constraint Satisfaction CSC242: Intro to AI Lecture 7 Games of Imperfect Knowledge & Constraint Satisfaction What is This? 25" 20" 15" 10" 5" 0" Quiz 1 25" B 20" 15" 10" F D C A 5" F 0" Moral Many people cannot learn from lectures

More information

Kazuyuki Tanaka s work on AND-OR trees and subsequent development

Kazuyuki Tanaka s work on AND-OR trees and subsequent development Kazuyuki Tanaka s work on AND-OR trees and subsequent development Toshio Suzuki Department of Math. and Information Sciences, Tokyo Metropolitan University, CTFM 2015, Tokyo Institute of Technology September

More information

Notes on Machine Learning for and

Notes on Machine Learning for and Notes on Machine Learning for 16.410 and 16.413 (Notes adapted from Tom Mitchell and Andrew Moore.) Learning = improving with experience Improve over task T (e.g, Classification, control tasks) with respect

More information

3) x -7 4) 3 < x. When multiplying or dividing by a NEGATIVE number, we SWITCH the inequality sign!

3) x -7 4) 3 < x. When multiplying or dividing by a NEGATIVE number, we SWITCH the inequality sign! Name: Date: / / WARM UP 1) What is the difference between an inequality and an equation.? QUIZ DAY! 2) One must be at least 35 years old in order to be president of the United States. If x represents age,

More information

Solving and Graphing Inequalities Joined by And or Or

Solving and Graphing Inequalities Joined by And or Or Solving and Graphing Inequalities Joined by And or Or Classwork 1. Zara solved the inequality 18 < 3x 9 as shown below. Was she correct? 18 < 3x 9 27 < 3x 9 < x or x> 9 2. Consider the compound inequality

More information

Decision making, Markov decision processes

Decision making, Markov decision processes Decision making, Markov decision processes Solved tasks Collected by: Jiří Kléma, klema@fel.cvut.cz Spring 2017 The main goal: The text presents solved tasks to support labs in the A4B33ZUI course. 1 Simple

More information

Introduction to Set Operations

Introduction to Set Operations Introduction to Set Operations CIS008-2 Logic and Foundations of Mathematics David Goodwin david.goodwin@perisic.com 12:00, Friday 21 st October 2011 Outline 1 Recap 2 Introduction to sets 3 Class Exercises

More information

Alternating-Time Temporal Logic

Alternating-Time Temporal Logic Alternating-Time Temporal Logic R.Alur, T.Henzinger, O.Kupferman Rafael H. Bordini School of Informatics PUCRS R.Bordini@pucrs.br Logic Club 5th of September, 2013 ATL All the material in this presentation

More information

Machine Learning 3. week

Machine Learning 3. week Machine Learning 3. week Entropy Decision Trees ID3 C4.5 Classification and Regression Trees (CART) 1 What is Decision Tree As a short description, decision tree is a data classification procedure which

More information

Should We Care about Don t Care Testing Inputs? Empirical Investigation of Pair-Wise Testing

Should We Care about Don t Care Testing Inputs? Empirical Investigation of Pair-Wise Testing 5th International Workshop on Combinatorial Testing (IWCT 2016) 10 April 2016, Chicago, USA Should We Care about Don t Care Testing Inputs? Empirical Investigation of Pair-Wise Testing Sergiy Vilkomir

More information

Jeffrey D. Ullman Stanford University

Jeffrey D. Ullman Stanford University Jeffrey D. Ullman Stanford University 3 We are given a set of training examples, consisting of input-output pairs (x,y), where: 1. x is an item of the type we want to evaluate. 2. y is the value of some

More information

Lecture 19: UCB Algorithm and Adversarial Bandit Problem. Announcements Review on stochastic multi-armed bandit problem

Lecture 19: UCB Algorithm and Adversarial Bandit Problem. Announcements Review on stochastic multi-armed bandit problem Lecture 9: UCB Algorithm and Adversarial Bandit Problem EECS598: Prediction and Learning: It s Only a Game Fall 03 Lecture 9: UCB Algorithm and Adversarial Bandit Problem Prof. Jacob Abernethy Scribe:

More information

: Cryptography and Game Theory Ran Canetti and Alon Rosen. Lecture 8

: Cryptography and Game Theory Ran Canetti and Alon Rosen. Lecture 8 0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 8 December 9, 2009 Scribe: Naama Ben-Aroya Last Week 2 player zero-sum games (min-max) Mixed NE (existence, complexity) ɛ-ne Correlated

More information

Final exam of ECE 457 Applied Artificial Intelligence for the Spring term 2007.

Final exam of ECE 457 Applied Artificial Intelligence for the Spring term 2007. Spring 2007 / Page 1 Final exam of ECE 457 Applied Artificial Intelligence for the Spring term 2007. Don t panic. Be sure to write your name and student ID number on every page of the exam. The only materials

More information

General-sum games. I.e., pretend that the opponent is only trying to hurt you. If Column was trying to hurt Row, Column would play Left, so

General-sum games. I.e., pretend that the opponent is only trying to hurt you. If Column was trying to hurt Row, Column would play Left, so General-sum games You could still play a minimax strategy in general- sum games I.e., pretend that the opponent is only trying to hurt you But this is not rational: 0, 0 3, 1 1, 0 2, 1 If Column was trying

More information

Kruskal s Theorem Rebecca Robinson May 29, 2007

Kruskal s Theorem Rebecca Robinson May 29, 2007 Kruskal s Theorem Rebecca Robinson May 29, 2007 Kruskal s Theorem Rebecca Robinson 1 Quasi-ordered set A set Q together with a relation is quasi-ordered if is: reflexive (a a); and transitive (a b c a

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics Yi Li Software School Fudan University March 13, 2017 Yi Li (Fudan University) Discrete Mathematics March 13, 2017 1 / 1 Review of Lattice Ideal Special Lattice Boolean Algebra Yi

More information

CSC 8301 Design & Analysis of Algorithms: Lower Bounds

CSC 8301 Design & Analysis of Algorithms: Lower Bounds CSC 8301 Design & Analysis of Algorithms: Lower Bounds Professor Henry Carter Fall 2016 Recap Iterative improvement algorithms take a feasible solution and iteratively improve it until optimized Simplex

More information

MS&E 246: Lecture 17 Network routing. Ramesh Johari

MS&E 246: Lecture 17 Network routing. Ramesh Johari MS&E 246: Lecture 17 Network routing Ramesh Johari Network routing Basic definitions Wardrop equilibrium Braess paradox Implications Network routing N users travel across a network Transportation Internet

More information

Searching in non-deterministic, partially observable and unknown environments

Searching in non-deterministic, partially observable and unknown environments Searching in non-deterministic, partially observable and unknown environments CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2017 Soleymani Artificial Intelligence:

More information

Local MAX-CUT in Smoothed Polynomial Time

Local MAX-CUT in Smoothed Polynomial Time Local MAX-CUT in Smoothed Polynomial Time Omer Angel 1 Sebastien Bubeck 2 Yuval Peres 2 Fan Wei 3 1 University of British Columbia 2 Microsoft Research Redmond 3 Stanford University November 9, 2016 Introduction

More information

On the Competitive Ratio of the Work Function Algorithm for the k-server Problem

On the Competitive Ratio of the Work Function Algorithm for the k-server Problem On the Competitive Ratio of the Work Function Algorithm for the k-server Problem Yair Bartal 1 Computer Science School, Hebrew University, Jerusalem, Israel Elias Koutsoupias 2 Department of Informatics,

More information

Repetition Prepar Pr a epar t a ion for fo Ex am Ex

Repetition Prepar Pr a epar t a ion for fo Ex am Ex Repetition Preparation for Exam Written Exam Date: 2008 10 20 Time: 9:30 14:30 No book or other aids Maximal 40 points Grades: 0 19 U (did not pass) 20 27 3 (pass) 28 32 4 (verygood) 33 40 5 (excellent)

More information

Extensive games (with perfect information)

Extensive games (with perfect information) Extensive games (with perfect information) (also referred to as extensive-form games or dynamic games) DEFINITION An extensive game with perfect information has the following components A set N (the set

More information

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms Computer Science 385 Analysis of Algorithms Siena College Spring 2011 Topic Notes: Limitations of Algorithms We conclude with a discussion of the limitations of the power of algorithms. That is, what kinds

More information

On Finding Subpaths With High Demand

On Finding Subpaths With High Demand Zuse Institute Berlin Takustr. 7 14195 Berlin Germany STEPHAN SCHWARTZ, LEONARDO BALESTRIERI, RALF BORNDÖRFER On Finding Subpaths With High Demand ZIB Report 18-27 (Juni 2018) Zuse Institute Berlin Takustr.

More information

PreCalculus: Chapter 9 Test Review

PreCalculus: Chapter 9 Test Review Name: Class: Date: ID: A PreCalculus: Chapter 9 Test Review Short Answer 1. Plot the point given in polar coordinates. 3. Plot the point given in polar coordinates. (-4, -225 ) 2. Plot the point given

More information

Game Theory. Kuhn s Theorem. Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano

Game Theory. Kuhn s Theorem. Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano Game Theory Albert-Ludwigs-Universität Freiburg Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano Research Group Foundations of Artificial Intelligence June 17, 2013 June 17, 2013

More information

ILLINOIS LICENSURE TESTING SYSTEM

ILLINOIS LICENSURE TESTING SYSTEM ILLINOIS LICENSURE TESTING SYSTEM FIELD 115: MATHEMATICS November 2003 Illinois Licensure Testing System FIELD 115: MATHEMATICS November 2003 Subarea Range of Objectives I. Processes and Applications 01

More information

[ ] 7. ( a) 1. Express as a single power. x b) ( 3) ( 3) = c) = 2. Express as a single power. b) ( 7) ( 7) = e) ( a) ( a) 3.

[ ] 7. ( a) 1. Express as a single power. x b) ( 3) ( 3) = c) = 2. Express as a single power. b) ( 7) ( 7) = e) ( a) ( a) 3. Mathematics Page Course Review (). Express as a single power. a) x = x b) ( ) ( ) = c) 6 0 6 = d) =. Express as a single power. a) = b) ( ) ( ) = c) 0 0 = d) ( x )( x )( x ) = = f) = e) ( a) ( a). Express

More information

Weather routing using dynamic programming to win sailing races

Weather routing using dynamic programming to win sailing races OSE SEMINAR 2013 Weather routing using dynamic programming to win sailing races Mikael Nyberg CENTER OF EXCELLENCE IN OPTIMIZATION AND SYSTEMS ENGINEERING AT ÅBO AKADEMI UNIVERSITY ÅBO NOVEMBER 15 2013

More information

Lecture 6. Probability events. Definition 1. The sample space, S, of a. probability experiment is the collection of all

Lecture 6. Probability events. Definition 1. The sample space, S, of a. probability experiment is the collection of all Lecture 6 1 Lecture 6 Probability events Definition 1. The sample space, S, of a probability experiment is the collection of all possible outcomes of an experiment. One such outcome is called a simple

More information

Maximising the number of induced cycles in a graph

Maximising the number of induced cycles in a graph Maximising the number of induced cycles in a graph Natasha Morrison Alex Scott April 12, 2017 Abstract We determine the maximum number of induced cycles that can be contained in a graph on n n 0 vertices,

More information

1. Consider a random independent sample of size 712 from a distribution with the following pdf. c 1+x. f(x) =

1. Consider a random independent sample of size 712 from a distribution with the following pdf. c 1+x. f(x) = 1. Consider a random independent sample of size 712 from a distribution with the following pdf f(x) = c 1+x 0

More information

SIS project n 1: Sound detection with a real e-puck. David FitzGerald Daniel Kroiss

SIS project n 1: Sound detection with a real e-puck. David FitzGerald Daniel Kroiss SIS project n 1: Goal: Program an e-puck in order to find a sound source. Equipment: Two e-pucks Three batteries Bluetooth USB key Programming language: C 2 Procedure: 1. Record the sound 2. Apply the

More information

On a Network Creation Game

On a Network Creation Game 1 / 16 On a Network Creation Game Alex Fabrikant Ankur Luthra Elitza Maneva Christos H. Papadimitriou Scott Shenker PODC 03, pages 347-351 Presented by Jian XIA for COMP670O: Game Theoretic Applications

More information

GSOE9210 Engineering Decisions

GSOE9210 Engineering Decisions Sutdent ID: Name: Signature: The University of New South Wales Session 2, 2017 GSOE9210 Engineering Decisions Sample mid-term test Instructions: Time allowed: 1 hour Reading time: 5 minutes This examination

More information

Written examination: Solution suggestions TIN175/DIT411, Introduction to Artificial Intelligence

Written examination: Solution suggestions TIN175/DIT411, Introduction to Artificial Intelligence Written examination: Solution suggestions TIN175/DIT411, Introduction to Artificial Intelligence Question 1 had completely wrong alternatives, and cannot be answered! Therefore, the grade limits was lowered

More information