Learn More
Perfect recall is the common and natural assumption that an agent never forgets. As a consequence, the agent can always condition its choice of action on any prior observations. In this paper, we explore relaxing this assumption. We observe the negative impact this relaxation has on algorithms: some algorithms are no longer well-defined, while others lose(More)
At AAAI, the University of Alberta hosted a computer poker competition in which participants were required to submit computer programs capable of playing Heads-Up 10/20 Limit Texas Hold'em. There were two tournaments: the bankroll tournament, and the series tournament. Five teams entered the competition. developed Hyperborean based on ideas from past work(More)
Evaluating the performance of an agent or group of agents can be, by itself, a very challenging problem. The stochas-tic nature of the environment plus the stochastic nature of agents' decisions can result in estimates with intractably large variances. This paper examines the problem of finding low variance estimates of agent performance. In particular, we(More)
For the first time since 2000, three programs competed in the Hex competition – Six (version 0.5.2) The Wolve team was the only one able to travel to Torino (see photos below). Six was operated by Fredrik Niemelä of the Royal Institute of Technology in Stockholm with assistance from Jakub Pawlewicz of the University of Warsaw. HexKriger was operated by(More)
— Researchers often have access to a variety of different high-performance computer (HPC) systems in different administrative domains, possibly across a wide-area network. Consequently, the security infrastructure becomes an important component of an overlay metacomputer: a user-level aggregation of HPC systems. The Grid Security Infrastructure (GSI) uses a(More)
Permission is hereby granted to the University of Alberta Library to reproduce single copies of this thesis and to lend or sell such copies for private, scholarly or scientific research purposes only. The author reserves all other publication and other rights in association with the copyright in the thesis, and except as herein before provided, neither the(More)
We present an algorithm which determines the outcome of an arbitrary Hex game-state by finding a winning virtual connection for the winning player. Our algorithm performs a recursive descent search of the game-tree, combining fixed and dynamic game-state virtual connection composition rules with some new Hex game-state reduction results based on move(More)
Researchers often have non-privileged access to a variety of high-performance computer (HPC) systems in different administrative domains, possibly across a wide-area network. 1 Consequently, the security infrastructure becomes an important component of an overlay metacomputer: a user-level aggregation of HPC systems. The Trellis Security Infrastructure(More)