期刊文献+

基于符号化模型检测的对弈必胜策略验证 被引量:1

Verifying winning strategy with symbolic model checking
下载PDF
导出
摘要 在对弈的研究中,验证对弈双方是否存在必胜策略的问题一直没能很好地解决,因为这涉及到超大规模的状态空间搜索。而随着符号化模型检测技术的发展,大规模系统的验证成为了可能。给出了使用符号化模型检测来验证对弈必胜策略的一般方法,并给出了一个井字棋必胜策略验证的实例。 In the research of two-player zero-sum games,verifying whether there exists winning strategy has not been solved oroperly,sinee it refers to the search of the grand scale state space.With the development of the symbolic model checking,however, verifying large systems becomes possible.This paper presents a common method of verifying the winning strategy of games with symbolic model checking,and gives a case study of Tic-Tac-Toe.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第17期58-60,共3页 Computer Engineering and Applications
关键词 符号化模型检测 二值判定图 对弈 必胜策略 symbolic model checking BDD zero-sum games winning strategy
  • 相关文献

参考文献9

  • 1Marsland T A,Bjmsson Y.From minimax to manhattan[J].Games in t AI Research,2000 : 5-17.
  • 2Berlekamp E R,Conway J H,Guy R K.Winning ways[M].USA:Academie Press, 1982.
  • 3Bryant.Symbolic boolean manipulation with ordered binary-decision diagrams[J].ACM Computing Surveys, 1992,24( 3 ) : 293-318.
  • 4苏开乐,骆翔宇,吕关锋.符号化模型检测CTL[J].计算机学报,2005,28(11):1798-1806. 被引量:24
  • 5沈浩,孙永强.自动机与模型检查[J].计算机工程与应用,2004,40(1):63-64. 被引量:3
  • 6Edelkamp S.Symbolic exploration in two-player games:Preliminary results[C]//AIPS,Workshop on Model Checking,2002:40-48.
  • 7Hurd J. Formal verification of chess endgame databases[C]//Theorem Proving in Higher Order Logics:Emerging Trends Proceedings, 2005 : 85-100.
  • 8Baldamus M,Schneider K,Wenz M,et al.Can American checkers be solved by means of symbolic model checking? [J].Theoretical Computer Science,2001,5(43):89-101.
  • 9Backhouse R,Michaelis D.Fixed-point characterisation of winning strategies in impartial Games[C]//LNCS 3051,2004:34-47.

二级参考文献37

  • 1[1]J R Buchi. On a decision method in restricted in second order arithmetic[C].In:Proc 1960 Int Congr for Logic,Standford Univ Press,Standford, 1962-01~11
  • 2[2]Y Choueka. Theories of automata on ω-tapes:A simplified approach[J].Journel of computer and system sciences, 1974;8:117~141
  • 3[3]E A Emerson,C-L Lei. Modalities for model checking:Branching timelogic strikes back[C].In:proceeding of the Twelfth ACM Symposium on Principles of Programming languages New Orleans, 1985:84~96
  • 4[4]E A Emerson,C-L Lei.Temporal model checking under generalized fairness constraints[C].In:Proc 18th Hawaii International Conference on System Sciences, Hawaii, 1985: 277~288
  • 5[5]R McNaughton.Testing and generating infinite sequences by a finite automaton[J].Information and Control,1966;9:521~530
  • 6[6]D E Muller. Infinite sequence and finite machines[C].In:Proc 4th Ann IEEE Symp on Swithching Theory and Logical Design,Chicago,1963:3~16
  • 7[7]S Safra.On the complexity of omega-automata[C].In:Proceedings of the 29th IEEE Symposium on Foundations of Computer Science,White Plains, 1988: 319~327
  • 8[8]Moshi Vardi.An automata-theoretic approach to linear temporal logic[C].In:Banff'94
  • 9[9]M Y Vardi,P Wolper. Reasoning about infinte computations[J].Information and computation, 1994; 115 ( 1 ): 1~37
  • 10[10]P Wolper,M Y Vardi,A P Sistla. Reasoning about infinite computation paths[C].In:Proc 24th IEEE Symposium on Foundation of computer Science,Tucson, 1983:185~194

共引文献25

同被引文献6

  • 1Chen Hao,Wagner D.MOPS:an inf rast ructure for ex-amining security properties of software[C]//Proceedings of the9th ACM Conference on Computerand Communi-cations Security(CCS).Berkeley CA:University of Cali-fornia at Berkeley,2002:235-244.
  • 2Ravi K,Somenzi F.Minimal assignments for bounded model checking[C]//Jensen K,Podelski A.LNCS2988:Proc of the10th Conf on Tools and Algorithms for the Construction and Analysis of Systems(TACAS2004).Heidelberg:Springer-Verlag,2004:31-45.
  • 3Han T,Katoen J P.Counterexamples in probabilisticmodel checking[G]//Lecture Notes in Computer Sci-ence4424.Berlin:Springer,2007:72-86.
  • 4Damman B,Han T,Katoen J P.Regular expressions for PCTL counterexamples[C]//Proc Int’l Conf Quantitative Evaluation of Systems,2008.
  • 5Minato S.Zero-suppressed BDDS for set manipulation in combinatorial problems[C]//30th ACM/IEEE Design Automation Conference,1993.
  • 6姚全珠,魏小勇.基于OBDD的SMC中PRE■操作的改进算法[J].计算机工程,2008,34(14):69-71. 被引量:4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部