Computer Chess Club Archives


Search

Terms

Messages

Subject: Threat Extension

Author: Stuart Cracraft

Date: 22:29:31 01/17/98


I read Thomas Anatharaman's (sp?) paper on extensions. After many
weeks or months of testing on Deep Whatever, he concluded that
the best extension by far was the threat extension.

I certainly believe that people in the micro field and Hyatt have a lot
more experience with extensions and may take issue with that but let
us forge onward.

So I read that paper very carefully but am no closer to a good threat
extension than before reading the paper. There's something about his
explanatory style that just seems very obscure and opaque to me.

To this august group, I say "What is threat extension and how do you
think it is best implemented?"

As you can observe, I'm asking for feedback, going off and implementing,
and then reporting the result. Typically, the procedure will be a
solicitation with subject "XYZ" and the report will be "Result of XYZ".
I hope you enjoy!

Is this computer chess programming by delphic process or what? :-)

--Stuart



This page took 0 seconds to execute

Last modified: Thu, 15 Apr 21 08:11:13 -0700

Current Computer Chess Club Forums at Talkchess. This site by Sean Mintz.