General principles of pruning, Computer Engineering

General principles of pruning:

The general principles are such that:

1. Given a node N that can be chosen by player one, thus if there is another node, X, along any path, like that (a) X can be chosen by player two (b) X is on a higher level than N and (c) X has been shown to guarantee a worse score for player one than N, after then all the nodes with the same parent as N can be pruned.

2. Given a node N that can be chosen by player two, after then if there is a node X along any path just like that (a) player one can choose X (b) X is on a higher level so than N and (c) X has been shown to guarantee a better score for player one than N, after then all the nodes with the equal parent as N can be pruned.

As an exercise: in which one of these principles did we need in the M1 - M4 pruning example above? (For this type of puzzle to make it easy, I've written on the N's and X's).

Posted Date: 1/10/2013 5:09:47 AM | Location : United States







Related Discussions:- General principles of pruning, Assignment Help, Ask Question on General principles of pruning, Get Answer, Expert's Help, General principles of pruning Discussions

Write discussion on General principles of pruning
Your posts are moderated
Related Questions
What is critical section problem? A race condition at data item occurs when many processes simultaneously update its value data consistency, needs that only one process should

The information in ROM is stored ? Ans. By the manufacturer throughout fabrication of the device.

What is index register? In index mode the effective address of the operand is formed by adding a constant value to the contents of a register. The register used might be either

Many physicists believe that the universe is governed by a single system. A system which is capable of describing the behaviour of the very large (stars and planets) and the very s

draw 4 bit binary to gray code

There are various limitations of primary memory like limited capacity which is its not enough to store a very large volume of data and volatility which is when power is turned off

Q. Approaches for development of information systems? Numerous approaches are available for development of Information Systems. They are as below: • Model Driven: It put e

specifies a form field where user can enter large amounts of text. In most respects, works like an field. It can have a name as well as a def

Q. Explain about RISC ARCHITECTURE? Let's first list some significant considerations of RISC architecture: 1. RISC functions are kept simple unless there is a very good reas

What are the Disadvantages of a VPN implementation The greatest disadvantage of a VPN implementation is its non-flexibility to accept unknown locations. VPN works extremely wel