Computer Games IILong before the advent of the electronic computer, man was fascinated by the idea of automating the thought processes employed in playing games of skill. The very first chess "Automaton" captured the imagination oflate eighteenth century Vienna, and by the early 1900s there was a genuine machine that could play the chess endgame of king and rook against a lone king. Soon after the invention of the computer, scientists began to make a serious study of the problems involved in programming a machine to play chess. Within a decade this interest started to spread, first to draughts (checkers) and later to many other strategy games. By the time the home computer was born, there had already been three decades of research into computer games. Many of the results of this research were published, though usually in publications that are extremely difficult (or even impossible for most people) to find. Hence the present volumes. Interest in computers and programming has now reached into almost every home in the civilized world. Millions of people have regular access to computers, and most of them enjoy playing games. In fact, approximately 80 percent of all software sold for use on personal computers is games software. |
Dentro del libro
Resultados 1-3 de 82
Página 155
Figure 1 ( a ) shows a Black group with two eyes on a 1 x 3 board . This is the
smallest board which can have a group of stones with two eyes . Isolated single
vertices can be replaced by larger connected groups of vacant vertices in the
above ...
Figure 1 ( a ) shows a Black group with two eyes on a 1 x 3 board . This is the
smallest board which can have a group of stones with two eyes . Isolated single
vertices can be replaced by larger connected groups of vacant vertices in the
above ...
Página 206
In Figure 3 the black block is safe , since White may not play in either of Black ' s
liberties due to the “ no suicide ” rule . The obvious algorithm for determining
whether a block b is safe is to attempt to play X stones on the intersections of L ( b
) .
In Figure 3 the black block is safe , since White may not play in either of Black ' s
liberties due to the “ no suicide ” rule . The obvious algorithm for determining
whether a block b is safe is to attempt to play X stones on the intersections of L ( b
) .
Página 257
The Language Specification of Gopal Figure 2 is an example of a Gopal program
which represents the two kinds of pattern knowledge in Figure 1 . This subsection
gives the main design decisions and a brief explanation of the main constructs ...
The Language Specification of Gopal Figure 2 is an example of a Gopal program
which represents the two kinds of pattern knowledge in Figure 1 . This subsection
gives the main design decisions and a brief explanation of the main constructs ...
Comentarios de la gente - Escribir un comentario
Crítica de los usuarios - Marcar como inadecuado
jlnknkn jytkjty jytrjytrj jt yjtrj
Contenido
Chess | 3 |
by ALAN M STANIER | 12 |
by Alan M STANIER | 21 |
Derechos de autor | |
Otras 23 secciones no mostradas
Otras ediciones - Ver todas
Términos y frases comunes
addition analysis arrangement begin Black block branch called changes chess complete components configuration considered consists corner data structure decision defined described determined developed discs discussed draw edge effect element evaluation example expert fact factor Figure final forcing four function given gives goal Hand heuristic human IAGO important initial interesting knowledge lead learning limited linkage machine means method move node Note object opening opponent pair particular pass pattern pieces planning play player poker position possible present probability problem reason region relations represent routine rules score selection sequence shows side simple situation square stones strategy string structure subgoals success suit tactical territory tournament tree Trick turn weighting White winning