Professional Documents
Culture Documents
Nov92-Jan93 Red
Nov92-Jan93 Red
corewar:
From: pk6811s@acad.drake.edu
Newsgroups: rec.games.corewar
Subject: the imp-ring problem
Message-ID: <1992Nov3.083911.1@acad.drake.edu>
Date: 3 Nov 92 14:39:11 GMT
Sender: news@dunix.drake.edu (USENET News System)
Organization: Drake University, Des Moines, Iowa, USA
Lines: 46
Nntp-Posting-Host: acad.drake.edu
I know a lot of people are working on the imp-ring problem, (me too).
Here are some ideas for experimentation.
New bombs:
dat <2666,<-2667
or
sub <2666,<-2667
It is also easy to catch an imp by the tail with some kind of stun bomb,
the problem is killing a complete layer before a new layer is formed.
The points are so far apart that the standard sequential core clear
isn't fast enough to catch them all in time.
Maybe the answer is a clear routine like:
mov bomb,ptr
add #2667,ptr
jmp -2
which will attack all three points (of a 3-point ring) at the same time.
Some people are having success, though they are keeping pretty tight-lipped.
Here is the latest round of scores for Imprimis, my own stone-ring combo.
(%wins for Imprimis/%wins for opponent/%ties)
Medusa's v1 53/34/13
Nazgul 27/38/35
anti-body 42/46/12
Impression v3 1/ 0/99
Pale Shears4 40/44/16
Agony 2.5 37/ 0/63
Winter Werewolf 28/27/45
Sauron 49/28/23
Sender of Eight 0/ 2/98
Atomic Sheep 7/ 1/92
B-scanners l.i.v. 57/21/22
Jehannum 76/18/ 6
PLASMA 18/10/72
Emerald 57/ 5/38
Nimbus 14/ 3/83
Kobold 6b 78/ 6/16
Paul Kline
pk6811s@acad.drake.edu
Article 1482 of rec.games.corewar:
Newsgroups: rec.games.corewar
Subject: Impression v3
Message-ID: <1992Nov16.064702.10776@wisipc.weizmann.ac.il>
From: fedimit@wisipc.weizmann.ac.il (Dan Nabutovsky)
Date: Mon, 16 Nov 1992 06:47:02 GMT
Organization: Weizmann Institute of Science, Computation Center
Lines: 81
Hi all,
This is my program Impression v3. As you can see, the main
principles of imp-writing are:
- Make spiral not ring
- One Ring is the best architecture
- Dwarf must get most of CPU time.
And, most important:
- Don't send your program to pdk. This schmuck will
make minor changes, send it to Koth under his name,
and then he'll blame you in copycatting.
;redcode
;name Impression v3
;kill P. Kline for plagiate
;author Dan Nabutovsky
;strategy 2 imp spirals + self-splitting dwarf
d EQU 2667
i EQU imp-2000
imp: mov 0,d
DAT #0
DAT #0
DAT #0
DAT #0
DAT #0
DAT #0
DAT #0
END start
Well, I see after our private conversation, Dan is still unhappy and has
gone public with his complaint.
;redcode
;name Emerald
;author P.Kline
inc dat #-2045,#2045
emerald spl 0,100
stone mov <cnt+102-300,<cnt+100
add inc,stone
cnt djn stone,<-3799
end emerald
Now, I estimate I spent over 40 hours experimenting with different constants
in Emerald to give it an effective (and unique) bombing pattern. I don't have
access to the programs that others use for computing their constants.
Apparently Dan was not able to find alternative constants, so elected
to use Emerald intact in Impression, changing only the word 'emerald' to
'dwarf'.
Also:
;redcode
;name Earnest
;kill Earnest
;author P.Kline
;strategy dwarf/ring combo
spacing equ 1143
start spl 1
spl 1
spl 1
spl a2
a1 spl a1b2
a1b1 spl a1b1c2
a1b1c1 mov imp1,imp1+(spacing*1)
jmp @-1
a1b1c2 mov imp1,imp1+(spacing*2)
jmp @-1
a1b2 spl a1b2c2
a1b2c1 mov imp1,imp1+(spacing*3)
jmp @-1
a1b2c2 mov imp1,imp1+(spacing*4)
jmp @-1
a2 spl a2b2
a2b1 spl a2b1c2
a2b1c1 mov imp1,imp1+(spacing*5)
jmp @-1
a2b1c2 mov imp1,imp1+(spacing*6)
jmp @-1
a2b2 spl a2b2c2
a2b2c1 mov imp1,imp1+(spacing*0)
jmp @-1
a2b2c2 spl 0
mov bomb,<bomb
bomb dat #-50
;redcode
;name Imprimis 2
;kill Imprimis
;author P.Kline
;strategy two three-point imp spirals with a stone
;strategy now capable of beating other imps (10%)
d equ 2667
datzero equ inc-5
inc dat #2667,#3039
emerald spl 0
stone mov <cnt-2365-2+1267,cnt+2365-1+10
add inc,stone
cnt djn stone,<5061-1056
datz1 dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
rf34 dat #2667,#3039
spl 0
mov <6902,<2376
add 7997,7999
djn 7998,<4005
datz2 dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
rf49 dat #2667,#3039
spl 0
mov <6902,<2376
add 7997,7999
djn 7998,<4005
datz3 dat #0
dat #0
dat #0
dat #0
dat #0
dat #0
spl 8
spl 4
spl 2
jmp imp+(d*2)+1333
jmp imp+(d*3)+1333
spl 2
jmp imp+(d*4)+1333
jmp imp+(d*5)+1333
spl emerald
spl emerald
spl emerald
jmp emerald
imp mov 0,2667
end start
Paul Kline
pk6811s@acad.drake.edu
More on copycatting:
In reality we all build on what others have done. Even IMPire built
on the old imp strategy. I think most people get stuck trying to
make an existing strategy more efficient - less lines of code, instead
of mixing strategies or trying something new. The originator has probably
tested many variations already, so we're not likely to improve an
existing program, and as the other guy (I forgot who's note I was replying
to) stated, "my variations usually degenerate into the existing Emerald
or Nomuckingabout or whatever".
I made the statement that in the long run, copycatting is not an effective
strategy. Your program will slowly slide down the hill - along with
the original - as other developers attack your common strategy. I think
this is a true statement. Flash Paper was basically undone by the
appearance of other stone-paper fighters.
(BTW, Matt, I removed the reflections. Since Charon and NMA disappeared,
they were only drawing the attention of other scanners. But I still know
where they are if I need them. :)
;redcode
;name Emerald
;kill Emerald
;author P.Kline
;strategy stone with djn stream
;strategy attempting a gate
spacing equ 2365
hide1 spl 0,<-6
hide2 mov 49,<-20
hide3 dat <-7,<-8
hide dat #inc+1037-130+1020
start mov hide3,inc+1037+48-130+1020
mov hide2,<hide ; create the one-dwarf->gate code
mov hide1,<hide
mov inc+0,inc+1020 ; move stone far away from decoy
hideb mov inc+1,inc+1020+1
mov inc+2,inc+1020+2
mov inc+3,inc+1020+3
mov inc+4,inc+1020+4
spl @hide
spl @hideb
mov #0,-7 ; don't leave any pointers to stone
mov #0,-7
mov #0,-7
mov #0,-7
mov #0,-7
inc dat #0-spacing,#spacing
emerald spl 0
stone mov <cnt-spacing-2,cnt+spacing
add inc,stone
cnt djn stone,<inc-129
end start
Paul Kline
pk6811s@acad.drake.edu
Want to see a very painful death against Corona? watch this :-)
More like suicide, really, but there's not much I can do about it.
;redcode-x
;name Sonic Boom 1.30
;author Eric J. Schwertfeger
;strategy Two SPL bombing carpet bombers going opposite
;strategy Directions, with a monitor that relaunches carpet
;strategy bombers whenever both die.
;strategy v 1.3X Going back to original bombing pattern, hence return
;strategy to 1.XX numbers.
WAIT EQU (568)
FSTEP EQU (16*12)
RSTEP EQU (-16*12)
RCSRC DAT 0,RBDST+(RSTEP)+1
RSTART MOV RCSRC,<(RBDST-RSTEP)
MOV RBDST-RSTEP,<(RBDST-RSTEP)
MOV RBDST-RSTEP,<(RBDST-RSTEP)
MOV RBDST-RSTEP,<(RBDST-RSTEP)
MOV RBDST-RSTEP,<(RBDST-RSTEP)
MOV RBDST-RSTEP,<(RBDST-RSTEP)
MOV RBDST-RSTEP,<(RBDST-RSTEP)
MOV RBDST-RSTEP,<(RBDST-RSTEP)
MOV RCSRC,<(RBDST-RSTEP) ; this pass
MOV RCSRC,<(RBDST-RSTEP)
MOV RCSRC,<(RBDST-RSTEP)
MOV RCSRC,<(RBDST-RSTEP)
RMOVE MOV <(RCSRC-RSTEP),<(RCDST-RSTEP)
RCDST JMP RSTART+RSTEP,RBDST+(RSTEP*2)+1
RBDST SPL 0,#RSTART-240
SHOOT SPL FLAUNCH
SPL RLAUNCH
MOV #(WAIT/3),DELAY
WATCH JMN DIE,RSTART-150
JMN DIE,FBDST+150
DELAY DJN WATCH,#DELAY
JMP SHOOT
FLAUNCH MOV #FCDST+2+FSTEP-FCSRC,FCSRC-FSTEP
MOV #2+(FSTEP*2),FCDST-FSTEP
MOV #FCDST+2+FSTEP-FCSRC,FCSRC
MOV #2+(FSTEP*2),FCDST
MOV #241,FBDST
SPL 1
SPL 1
SPL 1
SPL 1
JMP FMOVE
DIE DAT 0,0
LAUNCH SPL DLAUNCH
DJN 0,#(32*2+4)
MOV DIE,DSTART+(32*DSKIP)
JMP SHOOT
DSKIP EQU (247)
DLAUNCH MOV DSRC,DSRC-DSKIP
MOV DDEST,DDEST-DSKIP
SPL 1
MOV -1,0
JMP DSTART
DSRC DAT DDEST+1+DSKIP
DSTART MOV <DSRC-DSKIP,<DDEST-DSKIP
DDEST JMP DSTART+DSKIP,#1+(DSKIP*2)
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
DAT 0,0
RLAUNCH MOV #RCDST+2+RSTEP-RCSRC,RCSRC-RSTEP
MOV #2+(RSTEP*2),RCDST-RSTEP
MOV #RCDST+2+RSTEP-RCSRC,RCSRC
MOV #2+(RSTEP*2),RCDST
MOV #-254,RBDST
SPL 1
SPL 1
SPL 1
SPL 1
JMP RMOVE
FCSRC DAT 0,FBDST+(FSTEP)+1
FSTART MOV FCSRC,>(FBDST-FSTEP)
MOV FBDST-FSTEP,>(FBDST-FSTEP)
MOV FBDST-FSTEP,>(FBDST-FSTEP)
MOV FBDST-FSTEP,>(FBDST-FSTEP)
MOV FBDST-FSTEP,>(FBDST-FSTEP)
MOV FBDST-FSTEP,>(FBDST-FSTEP)
MOV FBDST-FSTEP,>(FBDST-FSTEP)
MOV FBDST-FSTEP,>(FBDST-FSTEP)
MOV FCSRC,>(FBDST-FSTEP)
MOV FCSRC,>(FBDST-FSTEP)
MOV FCSRC,>(FBDST-FSTEP)
MOV FCSRC,>(FBDST-FSTEP)
FMOVE MOV <(FCSRC-FSTEP),<(FCDST-FSTEP)
FCDST JMP FSTART+FSTEP,FBDST+(FSTEP*2)+1
FBDST SPL 0,#241
END LAUNCH
--
Eric J. Schwertfeger, maniac@cs.unlv.edu
I couldn't believe if there is any of us who would rather grab somebody else's
code, rename it without make any reasonable changes, submit it to KotH and
perceive it as his own thereafter. Even though we modify one or two lines,
we still could justify how much contribution we made on the success of
program. I think it is a very nice thing for people to have ways to accredit
the author of program they borrowed.
This copycatting is normal as far as we keep respecting the ethics we all know.
To come to the pure and original concepts is a very rare situation. Even though
it is pure, it also has to be success. We wouldn't have programs such as
Charon, Crimp, No Mucking About and others if the original concept (CMP scanner)
is limited to one. And similarly for other concepts such as B-scanner, paper,
slaver, bomber, IMPs, anti-IMPs etc
Now, imagine a situation when somebody submitted his program into KotH. And
somehow, his program inspired two other people who never know each other.
Both developed the same techniques and submitted the almost similar programs.
Both were success. Then who claimed the original ideas?
This might be the exact situation of the current debate about Impressive and
Imprimis.
And another one: a 'gate'. I called this 'IMPs gate' in my first posting since
there was no other term of using this kind of technique. And then P.Kline
started referring this to my name and made it public without asking me any
permission. Not long after, I think it was Campbell Fraser, described that he
also implemented the very same technique in his No More Mucking About. We never
talked each other. But, Beholder's Eyes (Modified B-scanners live in vain)
and No More Mucking About were the two scanners which occupied the very
high positions at the time after Anders published his IMPire. There was
no Campbell's posting (At least my local system doesn't receive it) and my
posting was distributed locally (My apologize to those who didn't receive it).
We both came to the same idea of using pre-decrement DAT to protect scanner
from IMPs independently. I stated this as non-unique (but original) technique
to avoid this kind of copycatting problem.
Below are three source codes. Two of them are repost of my previous ones to
those who haven't received it.
-----------------------------------------------------------------------------
;redcode
;name Beholder's Eye v1.1
;author W. Mintardjo
;strategy Modified B-Scanners Live in Vain (Matt Hastings) with IMPs immunity
;kill Beholder's Eye v1.1
END main
----------------------------------------------------------------------------
;redcode
;name Winter Werewolf
;author W. Mintardjo
;strategy SPL/JMP bomber with 2 pass core-clear (SPL/DAT) + self-defense
;strategy against IMPs
DAT <-4-n, #0
m MOV -1, 0-n
JMP 2
snow SPL 0, <-3-step-n
main MOV hold, @3
MOV snow, <2
ADD #step, 1
JMP main, init ; Hit here
MOV @-4, <n
hold JMP -1, 1
END m
----------------------------------------------------------------------------
;redcode
;name Medusa's v2
;author W. Mintardjo
;strategy Old CMP scanner with anti-IMPs
;strategy Submitted: @date@
CDIST equ 12
IVAL equ 28
FIRST equ scan-OFFSET+IVAL
OFFSET equ 5324
end comp
Note about this program: The original version of this is due to Stefan Strack's
Agony 2.4b. Ok, so old cmp-scanner was Agony 2.4b. And I decided to redesign
this program to create a more sophisticate cmp-scanner with spl carpet bombing
+ imp defense.
As it can be inspected, the only things unchanged from Agony 2.4b are:
its constants, variable names, and the way it scan which is implemented in most
of cmp-scanner: ADD, CMP, SLT and DJN. I have acknowledged Stefan Strack about
how I derive Medusa's.
--- W. Mintardjo
Hiyas,
;redcode
;name orc
;author Timothy Echeandia
;strategy Well I am rather new to corewar so I tried combining imp
;and dwarf. You get a more deadly imp an thereby the name orc. I am
;running corewars the X11 version and it survived against xtc. I think
;that this warrior more survives and ties than kills off. Right now
;killing off is giving me problems.
;redcode
;name Emerald 2
;kill Emerald
;author P.Kline
;strategy stone with djn stream
;strategy attempting a gate
;strategy new anti-pittrap code
spacing equ 2365
hide1 spl 0,<-6
hide2 mov 49,<-20
hide3 sub @hide2,<hide2 ; hide2 + hide3 kill pit-trappers
hide4 dat <-7,#0 ; hide4 + hide1 will eventually make an imp-gate
hide dat #inc-17+1594+351
start mov hide4,inc-17+1643+350
mov hide3,@hide ; put outrigger in a hole in the bombing pattern
mov hide2,<hide
mov hide1,<hide
mov inc+0,inc+1020
hideb mov inc+1,inc+1020+1 ; move stone away from decoy
mov inc+2,inc+1020+2
mov inc+3,inc+1020+3
mov inc+4,inc+1020+4
spl @hideb
spl @hideb
spl @hide
mov #0,-7 ; erase pointers to stone
mov #0,-7 ; (needs work, I know)
mov #0,-7
mov #0,-7
mov #0,-7
inc dat #0-spacing,#spacing
emerald spl 0
stone mov <cnt-spacing-2,cnt+spacing
add inc,stone
cnt djn stone,<inc-129
end start
;redcode
;name ExtraExtra 2
;kill ExtraExtra
;author P.Kline
;strategy improved stone (2667/2045)
;strategy with anti-imps and anti-pittrap code
copyf1 dat #cnt+1
copyt1 dat #inc+1000
copyt2 dat #inc+1000+3039 ; this is a reflection (still working on it, Matt)
hide1 spl 0,<-6
hide2 mov 403,<-20
hide3 sub @hide2,<hide2 ; hide2 + hide3 kill pittrappers
hide4 jmp -2,1000 ; 1000 protects from the stone
hide5 dat <-7,#0 ; hide5 + hide1 will eventually make an imp-gate
hide dat #inc+3354
start mov hide5,inc+3755 ; put outrigger in a hole in the bombing pattern
mov hide4,@hide
mov hide3,<hide
mov hide2,<hide
mov hide1,<hide
mov <copyf1,<copyt1 ; move stone away from decoy
mov @copyf1,<copyt2 ; to present as small a scan-target as possible
mov <copyf1,<copyt1
mov @copyf1,<copyt2
mov <copyf1,<copyt1
mov @copyf1,<copyt2
mov <copyf1,<copyt1
mov @copyf1,<copyt2
spl @copyt1
mov <copyf1,<copyt1
mov @copyf1,<copyt2
jmp @hide
inc dat #2667,#2045 ; 2667 chases down imp-rings
dwarf mov <100,<cnt+2045
extra spl dwarf,<-100 ; this structure grows cycles very fast
add inc,dwarf ; so even if outrigger is spl-jmp bombed
cnt djn extra,<extra-100; it has small affect (for a while)
dat #(0-cnt)*128
dat #(0-cnt)*128
. . . more of the above to make 100-line decoy
------------------------------------------------------------------------
RED RAIN 83 / 3 / 14
Sucker 5 66 / 25 / 9
a-test 64 / 29 / 7
jj 64 / 31 / 5
Medusa's v2 58 / 34 / 8
Agony Anti-Imp 58 / 21 / 21
Sauron 57 / 23 / 20
Emerald 2 46 / 31 / 23
Leprechaun 1b 44 / 40 / 16
Griffin 2 41 / 51 / 8
Alt2 40 / 54 / 6
Wrack 33 / 30 / 37
Impression v4 21 / 33 / 46
+0 Stormbringer 20 / 37 / 43
Pale Shears4 25 / 53 / 22
IT 9 / 39 / 52
Imprimis 3 7 / 46 / 47
Paratroops v1.1 11 / 74 / 15
scan8 5 / 74 / 21
Gamma Paper 2.0 14 / 83 / 3
I wish there was a way to query the Hill for the latest win/loss
table for the current fighters . . .wms? Since no one is publishing
source, ANY information would be helpful.
Paul Kline
pk6811s@acad.drake.edu
;redcode verbose
;name PLASMA 4a
;author Wayne Sheppard
spl 0
mov bomb,<loc
jmp -1,<loc
;redcode verbose
;name RED RAIN
;author Wayne Sheppard
;strategy Bscanner
;kill RED RAIN
add #3044,1
jmz -1,-2
mov -3,@-1
jmp -3
--
Wayne Edward Sheppard
Georgia Institute of Technology, Atlanta Georgia, 30332
uucp: ...!{decvax,hplabs,ncar,purdue,rutgers}!gatech!prism!gt7804b
Internet: gt7804b@prism.gatech.edu
BTW: Does anyone know how to contact Jon Newman? His system seems to be down...
/Anders Ivner
;redcode
;name Griffin 2
;author Anders Ivner
;strategy small spl/jmp bombing cmp-scanner
end boot
;redcode
;name Leprechaun 1b
;author Anders Ivner
;strategy Combined Bomber/B-scanner, giving a total speed of 67% of c
dat <-21, #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
dat #1
dat #1
dat #1
dat #0
end boot
Cheers,
Si.
;redcode
;name Artagel v3
;author Simon Hovell
;strategy: bomber with gate
Artagel:spl 0, <-20
mov 3,1-3359
add #-3359,-1
jmp -2,<-23
dat <-21,<1 ;1 inserted to slow down djn start,<loc bombers
end Artagel ;a bit
I do not think the resulting imp-gate does much good, looks like gating
your own imps is harder than gating your opponent's imps - since you
have to interleave the processes - imp/gate/imp/gate/imp/gate...
Maybe someone could suggest a launcing sequence that would do that?
;redcode
;name Imprimis 4
;kill Imprimis
;author P.Kline
;strategy stone like ExtraExtra
;strategy two 3-point spirals like Impression
;strategy anti-vampire code
;strategy core clear -> imp-gate
;strategy sorry - sink wouldn't fit
d equ 2667
spl 8
spl 4
spl 2
jmp imp+(d*2)+2333+97+132
jmp imp+(d*3)+2333+97+132
spl 2
jmp imp+(d*4)+2333+97+132
jmp imp+(d*5)+2333+97+132
stst spl 1 ; give the stone some cycles
spl 1
spl 1
spl 1
jmp @copyt1
Imprimis 4 wins: 14
Sphinx v2.6 wins: 12
Ties: 74
Imprimis 4 wins: 6
It wins: 0
Ties: 94
Imprimis 4 wins: 7
Night wins: 0
Ties: 93
Imprimis 4 wins: 15
Gamma Paper 3.0 wins: 16
Ties: 69
Imprimis 4 wins: 7
+0 Stormbringer wins: 2
Ties: 91
Imprimis 4 wins: 86 <- anti-vamp
Sucker 5 wins: 6
Ties: 8
Imprimis 4 wins: 39
Charon v8.0 wins: 53
Ties: 8
Imprimis 4 wins: 76 <- anti-vamp
Twilight Pits 6 wins: 13
Ties: 11
Imprimis 4 wins: 41
Medusa's v5 wins: 52
Ties: 7
Imprimis 4 wins: 32
a-test wins: 60
Ties: 8
Imprimis 4 wins: 36
Alt2 wins: 47
Ties: 17
Imprimis 4 wins: 87
Emerald 3 wins: 3
Ties: 10
Imprimis 4 wins: 35
Agony Anti-Imp wins: 50
Ties: 15
Imprimis 4 wins: 40
Pale Shears4 wins: 45
Ties: 15
Imprimis 4 wins: 39
Leprechaun 1b wins: 36
Ties: 25
Imprimis 4 wins: 20
test2 wins: 8
Ties: 72
Imprimis 4 wins: 52
Griffin 2 wins: 38
Ties: 10
Imprimis 4 wins: 86 <- anti-vamp
Grimm's Vampyre wins: 12
Ties: 2
Paul Kline
pk6811s@acad.drake.edu
;redcode quiet
;name RedRain
;author Wayne Sheppard
add #3039,1
jmz -1,-1
mov 2,@-1
jmp -3
Here is the program that tank beats 99 times. Alot of other programs
beat it 99-100 times. But it beats all of the scanners about 60-70%
I modified the constant so that it scans 3/4 of the core before it
kills itself. This allows it to kill a couple more programs by
giving up some ties.
--
Wayne Edward Sheppard
Georgia Institute of Technology, Atlanta Georgia, 30332
uucp: ...!{decvax,hplabs,ncar,purdue,rutgers}!gatech!prism!gt7804b
Internet: gt7804b@prism.gatech.edu
;redcode quiet
;name Iron Gate
;author Wayne Sheppard
;strategy cmp scanner-SPL/JMP-Gate
;kill Iron Gate
add off,@x
loc cmp dist-1,-1
slt #14,@x
djn -3,<7000
mov j,@loc
x mov s,<loc
sub new,@x
jmn loc,loc-1
s spl 0,<1-dist
mov 2,<-2
j jmp -1
new dat <0-dist,<0-dist-1
off dat #scan,#scan
--
Wayne Edward Sheppard
Georgia Institute of Technology, Atlanta Georgia, 30332
uucp: ...!{decvax,hplabs,ncar,purdue,rutgers}!gatech!prism!gt7804b
Internet: gt7804b@prism.gatech.edu