[fa.human-nets] HUMAN-NETS Digest V7 #50

human-nets@ucbvax.ARPA (09/17/84)

From: Charles McGrew (The Moderator) <Human-Nets-Request@Rutgers>


HUMAN-NETS Digest        Sunday, 16 Sep 1984       Volume 7 : Issue 50

Today's Topics:
              Queries - Errata-Exchange Mailing List? &
                            Arts Database,
         Computers and the Law - Export Control of Software &
                  Privacy vs. Commercial Databases,
            Information - ACM'84 Conference Announcement,
                    Chess - Chess in Human-Nets &
                             Move No. 11
----------------------------------------------------------------------

Date: 9 Sep 1984 0801-PDT
From: Rem@IMSSS
Subject: Humorous typo, errata-exchange mailing list??

Sometimes typographic errors can be funny. For example, the latest
issue of RAG (Random Access Guide, a computer-faire publication) says
on page 3 that the Altair 8800 was the first computer. (They probably
meant to say the first microcomputer.)

I'm interested in starting an errata-exchange mailing list, whereby
people like myself who find typos and other errors in printed or
online media can exchange listings of errata. When two people read the
same document/article, the errata from the first person's reading can
save the second person the trouble of bumping into the errors again.
Even when only one person reads a particular item, others can get a
sample of the accuracy of that kind of item from that source, and use
that info to evaluate whether they should trust that source in the
future. -- Anybody else interested in such a mailing list?

------------------------------

Date: Sun 9 Sep 84 12:49:16-EDT
From: Janet Asteroff <US.JFA%CU20B@COLUMBIA>
Subject: Arts Database Query
Reply-to: us.jfa%cu20b@columbia-20.arpa



I am trying to find out if there is a database service that deals with
film--specifically film periodicals, for the purpose of keeping up on
a wide range of film criticism without collecting boxes of paper.

Something like Dialog or ABI/Inform, where abstracts can be looked at
and complete copies can be ordered.

If anyone knows of such a database, information would be appreciated.

/Janet

(US.JFA%cu20b@columbia-20.arpa)

------------------------------

Date: 16 Sep 84 16:57:09 EDT
From: DIETZ@RUTGERS.ARPA
Subject: Export control of software

I'm sure the NSA will conclude that controlling software export is
impossible.  If the USSR wants to export a piece of code they need
only send it to one of their satellites, either by microwave or laser.
The former could be camoflagued as a satellite TV receiver, the later
could use a small IR laser and would be nearly invisible.

Controlling the physical export of software is also difficult.  I need
only encrypt the software and carry it on my person.  If stopped, I
could refuse to divulge the password (5th amendment).  Could the
government then confiscate the diskette (or whatever)?  They'd have no
proof it was restricted.

------------------------------

Date: 16 Sep 84 19:42:22 EDT
From: DIETZ@RUTGERS.ARPA
Subject: Privacy vs. Commercial Databases

The best way for me to make sure inaccurate personal information about
myself isn't transmitted is for me to distribute the information
directly.  One can imagine a system in which each person maintains or
hires someone to maintain a personal database.  There is no point in
making such a database available to others unless it is autenticated,
but at least that reduces the role of credit agencies from that of
sole sources of information to that of accuracy checkers.

If detailed information about my finances is useful to others, it
could be extremely valuable to me.  A comprehensive financial
database, including a list of all my expenditures, would make possible
a computerized tax advisor program that could potentially save
thousands of dollars a year (not to mention saving time and hassle if
you're audited).

The big problem here is data entry.  Some sort of EFT is desirable for
electronic receipts (using a public key signature scheme?).  Failing
that, you'd want some sort of poortable data entry device to record
expenditures, such as a "smart credit card" or a portable voice input
device (it wouldn't have to operate in real time if sufficient
recording capacity were available, or if the recorded input could be
dumped periodically to a stationary computer).  In the shorter term, a
machine readable bank statement would be useful.

------------------------------

From: Eugene Miya <eugene@AMES-NAS-GW.ARPA>
Date: 13 Sep 1984 1528-PDT (Thursday)
Subject: ACM'84 Conference Announcement

Please send information requests to Lew Bornmann
(bornmann@ames-nas-gw), not me.

--eugene miya
  NASA Ames Research Center
======================================================================

                ACM-84:  The Fifth Generation Challenge

What:   ACM-84, the Association for Computing Machinery's 1984 Annual
        Conference.
When:   October 8 to 10, 1984, with an "Early Bird" reception on
        Sunday, October 7.
Where:  At the San Francisco Hilton and Tower, Mason and O'Farrell
        Streets, San Francisco
Theme:  The Fifth Generation Challenge

The Conference will examine:

        The Impact of the Fifth Generation.
                Specifically, the effect that Fifth Generation
                computers will have over the next decade on society,
                industry, the professions, and computer science.
        The Building Blocks of the Fifth Generation.
                An examination of current developments, new
                techniques, and new products which will take computing
                into the 1990s.
        The Character of Integration...
                in the Fifth Generation.  How the Fifth Generation
                building blocks will fit together, and the impact of
                integration.

The technical conference program will complemented by:
        o       Professional Development Seminars.
        o       An exhibit program.
        o       An educators' program.
        o       A computer chess championship.

Social events will include a "Themes of San Francisco" gala evening
and an awards luncheon.

Special travel arrangements have been made with Corporate Travel
Services of Sunnyvale, Ca.  These include discounted air fares and
pre- and post-conference tours.  (CTS toll-free phone number:
800/851-3478; in California: call 408/734-9990 collect.)

Advance Registration Fees:
        $110.00 ACM Members
        $150.00 Non-ACM Members

Accommodations: Blocks of rooms for ACM-84 have been reserved.  Please
contact the Hilton directly for reservations.  When calling, specify
ACM-84 for reduced rates.
        Director of Front Office Operations
        San Francisco Hilton Tower
        Mason and O'Farrell Streets
        San Francisco, Ca.  94102
        (415)771-1400

Room rates:
        Singles begin at $67
        Double begin at $87

For any additional information, contact:
        (415)948-6306

------------------------------

Date: 7 Sep 84 22:21:56 EDT
From: Dave <Steiner@RUTGERS.ARPA>
Subject: Re: Chess in Human-Nets
To: Katz@UCI-750A.ARPA, mclure@SRI-PRISM.ARPA



There is a digest in which the "Delphi" chess experiments also
appear.  That is the Chess digest.  This is not to say that the
Human-Nets community is not also interested.

ds

------------------------------

Date: Mon Sep 10 22:12:57 1984
From: mclure@sri-prism
To: chess@sri-unix, ailist@sri-ai
Subject: number-cruncher vs. the world

The Vote Tally
--------------
The winner is: 11 ... Nxe2 (NxB).

A total of 11 moves were cast.

The Machine Moves
-----------------
        Depth   Move    Time for search         Nodes    Machine's Est
        8 ply   Qxe2    5 hours, 43 minutes    2.06x10^7           +=
                (QxN)

                Humans                    Move        # Votes
        BR ** -- BQ BK BB -- BR       11 ... Nxe2       7
        ** BP ** -- ** BP BP BP       11 ... Nxf3       1
        BP ** -- BP -- BN -- **       11 ... b5         1
        ** -- ** WP BP -- ** --       11 ... Nxe4       1
        -- ** -- ** WP ** BB **       11 ... Qb6        1
        ** -- ** -- ** WN ** --
        WP WP -- ** WQ WP WP WP
        WR WN WB -- WR -- WK --
             Prestige 8-ply

The machine still thinks it is ahead positionally. Its evaluation
dropped from 13% of a pawn to 8% of a pawn.

The Game So Far
---------------
1. e4  (P-K4)   c5 (P-QB4)      11. Be2 (B-K2)  Nxe2 (NxB)
2. Nf3 (N-KB3)  d6 (P-Q3)       12. Qxe2 (QxN)
3. Bb5+(B-N5ch) Nc6 (N-QB3)
4. o-o (O-O)    Bd7 (B-Q2)
5. c3  (P-QB3)  Nf6 (N-KB3)
6. Re1  (R-K1)  a6  (P-QR3)
7. Bf1  (B-KB1) e5  (P-K4)
8. d4   (P-Q4)  cxd4 (PXP)
9. cxd4 (PXP)   Bg4  (B-N5)
10. d5   (P-Q5)  Nd4  (N-Q5)

Commentary
----------
JPERRY@SRI-KL

     I vote for NxN rather than NxB because White's king bishop is a
    bad bishop (as is Black's).  We would rather give up our,
    heretofore, inactive queen's knight for White's active king knight
    rather than his KB which is hampered by his own pawns.  If white
    replies BXN (likely), then Q-Q2 would be a better reply than BXB
    because the Queen can cause more damage on White's vulnerable
    light squares.

AVG@SU-AIMVAX

    Please put avg@diablo on the list for this game.
 I vote 11 .... Nxe2.
 Move 11 looks obvious, but what should our plan be for the future?
 White has the Q-side, so our chances lie on the K-side and the theme
 is to attack the base of White's pawn chain with f5.
 Two development plans are:
 (A) Be7 and retreat Bd7 if the bishop is kicked.  Then O-O and Ne8,
    preparing f5.  This keeps our d-pawn well guarded, but offers
    little scope for the B on e7.  Also, White can capture exf5 and
    gain e4 for a knight, leaning on the d-pawn.  We might play g6
    before f5 so we can recapture gxf5.
 (B) Like (A), but retreat Bh5 if the bishop is kicked with h3.  This
     may well provoke g4, inhibiting our f5.
 (C) g6 and Bg7 and retreat Bd7 if the bishop is kicked.  Then O-O and
    Ne8 or Na5, preparing for f5.  Now if exf5, we have gxf5, with
    control of e4 and a mobile pawn center; thus White is unlikely to
    capture exf5.  The drawbacks are the weakness of the d-pawn and
    the pin after Bg5.
  I would favor (C) against a person because it is more active.
  I dont think White can build enough pressure on the
  d-pawn to cause serious problems.  If Bg5 h6, Bh4 we can break the
  pin at the right moment with g5 and get in f5 soon after.  This
  furthers our overall plan of a King-side attack.
  However against a computer, (A) is probably better.  Without any
  obvious targets, the computer may have trouble forming a plan.
  Meanwhile we can prepare quietly for f5.
  (B) maintains a pin, but I dont see any value in the pin for us, and
  dont care to provoke g4.

ACHEN.PA@XEROX

  11 ... Nxe2 is the only sensible move.

  White's Be2 is just a set up for possible 12 Nxd4 and threatening
 with Bxf4. for the same reason, Black can't 11 ...  Nxe4.  I thought
 White's 10 d5 was too conservative, this move took the most of the
 pressure off King file.  If 10 Be2 ...  Black would be forced to
 retreat the lone bishop else stand a chance of either losing it or
 King's pawn.  I am willing to agree with Prestige that the current
 position does favor the White, since Black's attack seem to be
 stalling.

Solicitation
------------
    Your move, please?

        Replies to Arpanet: mclure@sri-prism or
        Usenet: ucbvax!menlo70!sri-unix!sri-prism!mclure

------------------------------

End of HUMAN-NETS Digest
************************