1
CN(x)
. It was chosen based on intuition, and since it is
an approximation, other functions may also perform
well.
The method also has some drawbacks. The most
notable one is the expensive cost of building a mini-
max tree which is inherited from conspiracy number.
If we could calculate or approximate conspiracy num-
bers without the need of a minimax tree, we could use
the method much more freely, such as using alpha-
beta or other fast game playing algorithms.
ACKNOWLEDGEMENTS
The authors thank the anonymous referees for their
insightful and detailed comments. This research is
funded by a grant from the Japan Society for the Pro-
motion of Science, in the framework of the Grant-
in-Aid for Challenging Exploratory Research (grant
number 26540189).
REFERENCES
Allis, V., van der Meulen, M., and van den Herik, J. (1994).
Proof-number search. Artificial Intelligence, 66(1):91
– 124.
Anantharaman, T., Campbell, M. S., and Hsu, F.-h. (1990).
Singular extensions: Adding selectivity to brute-force
searching. Artificial Intelligence, 43(1):99–109.
Beal, D. F. (1990). A generalised quiescence search algo-
rithm. Artificial Intelligence, 43(1):85–98.
Elkan, C. (1989). Conspiracy numbers and caching for
searching and/or trees and theorem-proving. In IJCAI,
pages 341–348.
Goetsch, G. and Campbell, M. S. (1990). Experiments with
the null-move heuristic. In Computers, Chess, and
Cognition, pages 159–168. Springer.
Khalid, M. N. A., Yusof, U. K., Iida, H., and Ishitobi,
T. (2015). Critical position identification in games
and its application to speculative play. In Interna-
tional Conference on Agents and Artificial Intelli-
gence (ICAART-2015).
Kishimoto, A., Winands, M. H., M
¨
uller, M., and Saito, J.-T.
(2012). Game-tree search using proof numbers: The
first twenty years. ICGA Journal, 35(3):131–156.
Klingbeil, N. and Schaeffer, J. (1990). Empirical re-
sults with conspiracy numbers. Computational Intel-
ligence, 6(1):1–11.
Knuth, D. E. and Moore, R. W. (1975). An analysis of
alpha-beta pruning. Artificial intelligence, 6(4):293–
326.
Lister, L. and Schaeffer, J. (1994). An analysis of the con-
spiracy numbers algorithm. Computers & Mathemat-
ics with Applications, 27(1):41 – 64.
McAllester, D. A. (1988). Conspiracy numbers for min-max
search. Artificial Intelligence, 35(3):287 – 310.
McAllester, D. A. and Yuret, D. (2002). Alpha-beta-
conspiracy search. ICGA Journal, 25(1):16 – 35.
Schaeffer, J. (1990). Conspiracy numbers. Artificial Intelli-
gence, 43(1):67 – 84.
Schaeffer, J., Burch, N., Bj
¨
ornsson, Y., Kishimoto, A.,
M
¨
uller, M., Lake, R., Lu, P., and Sutphen, S. (2007).
Checkers is solved. science, 317(5844):1518–1522.
Seo, M., Iida, H., and Uiterwijk, J. W. (2001). The PN*-
search algorithm: Application to tsume-shogi. Artifi-
cial Intelligence, 129(1):253–277.
Shannon, C. (1950). Programming a computer for playing
chess. Philosophical Magazine, 41(314):256 – 275.
Stockman, G. C. (1979). A minimax algorithm better than
alpha-beta? Artificial Intelligence, 12(2):179–196.
Turing, A. M., Bates, M., Bowden, B., and Strachey, C.
(1953). Digital computers applied to games. Faster
than thought, 101.
United States Othello Association (2015). 2015 national
open transcripts.
VanderMeulen, M. (1990). Conspiracy-number search.
ICCA Journal, 13(1):3–14.
APPENDIX
CAEV. Here is the procedure to calculate the
CAEV of a node.
Algorithm 3: Func CAEV (node).
ev ← node.eval
sum ← 0
for v = ev − RANGE + ST EP; v <= ev+RANGE;
v+ = ST EP do
sum+ = intgr(v − ST EP,
1
CN(v−ST EP)
, v,
1
CN(v)
)
end for
return sum
In the above procedure, RANGE is the maximum
distance of the evaluation value to the current value
of the root. We do not need to calculate the maxi-
mum or minimum possible evaluation values because
such values would have very high conspiracy num-
bers, which means that their inverse will be extremely
small and can be disregarded. ST EP is the segments’
length; a smaller ST EP indicates a better approxima-
tion and thus a higher computational cost. In our ex-
periments, we set RANGE to 1000, which is equal to
the difference of 1 corner stone in our evaluation func-
tion, and ST EP to 50. The function intgr(x,fx,y,fy)
will calculate the integral from x to y of a straight line
which goes through (x, f x) to (y, f y).
Using Conspiracy Numbers for Improving Move Selection in Minimax Game-Tree Search
405