Rebel wrote:Jeremy Bernstein wrote:The Rykba 1.0 Beta PST tables are generated by that code. That is, they are reproduced exactly. I tend to think that you are having a language comprehension issue, Ed.
No
But you are close now, ready for part II, my page is 100% correct, I quote:
http://www.top-5000.nl/pst.htm wrote:
With the above values (and now things become technical) the Rybka investigators Zach Wegner and Mark Watkins
in order to find traces of copying after all tried Fruit's PST initialization code, tried various parameter settings, found some matches and claimed copying.
VIG at work. Vas is a copy boy. He copied Fruit, period. Now we must find evidence he copied the PST's. But we have a problem, the PST's don't match at all. Someone got an idea, let's try the Fruit initialization code and see how far we come. So following Mark words they
changed Fruit's formula a bit, played around with the Fruit parameters and claimed copying, found some matches (not all match) and claimed copying confirm the VIG tunnel vision. A working mechanism if you think VIG and already are convinced Vas copied Fruit. No doubts here.
Then Chris sets the PST's on the agenda (at that time i was still VIG myself), Miguel moves in and demonstrates with DIFFERENT code the SAME can be accomplished. It worked as another eye-opener for me.
http://www.top-5000.nl/pst.htm wrote:
However as professor Miguel Ballicora clearly demonstrated with his OWN utilities the same can be accomplished with total different code so the basic premise using Fruit's formula to proof Rybka values is wrong, there are infinite possible formula to accomplish that.
Let's recap this case from a scientific point of view and count the ASSUMPTIONS that are made:
The facts first:
1. Fruit does not have PST data, PST's are created by initialization code at program start.
2. Rybka has PST data inside, there is no initialization code.
3. The PST values totally differ.
The assumptions:
1. Vas is copy-boy and an obfuscator, in order to hide the Fruit origins he obfuscated the depth, nodes, pawn value 100 -> 3200 and for advanced obfuscation added another ingredient 3200 ->3399, he changed the order in EVAL and UCI -> changed time control from float to int, removed all Fruit's UCI options (20) and replaced it with one Fruit does not have. It's all refuted on:
http://www.top-5000.nl/evidence.htm There is no fixed pattern of obfuscation and yet with the PST's one has to assume there is to make the case plausible.
2. Second assumption, since there is no PST initialization code in Rybka we must ASSUME Vas copied the Fruit initialization code, made it a standalone C-utility, changed the code somewhat, played around with the parameters then imported the PST data into the Rybka sources. Obfuscation mission accomplished. Oh yes, Vas multiplied the values with 32 for maximum obfuscation, by all means let's not forget that.
3. Third assumption, Vas a no-name in computer chess till december 2005 must have realized that after the release of Fruit 2.1 5½ months earlier (June 2005) he would become so famous his program would be hacked, reverse engineered and therefore all this kind of obfuscations were absolutely needed to hide the Fruit origins and yet was stupid enough to call Strelka his own, the latter actually being evidence for his innocence. An obfuscator would keep his mouth shut. A copy-boy would hide, knowing that by claiming Strelka as his own that is oil on the fire for the accusers since Strelka is half Fruit, half Rybka. Yet we saw a strong and normal emotional reaction from a programmer who discovered his program was cloned. We have seen such strong reactions before, from Bob, from Mark Lefler when someone took his work and called it Scaramanga.
Too much assumptions to my taste and after Miguel demonstrated:
1. That other (non-Fruit) code can accomplish the same;
2. That numbers like (-3,-1,0,+1) are the base of every PST and none can claim copyright on 4 characters;
3. How little information and specific content PST's cells have;
that it's far more logical Vas created his own PST's as he stated last month himself.
Vasik Rajlich: The piece-square table C# code - unfortunately I have only the code which creates my piece-square tables today. The piece-square tables are similar but not exactly the same as the Rybka 1 piece-square tables. Also, I definitely have tinkered with the C# code in the last six years. For example now I use .NET reflection, which AFAIK was not even around in 2005. So, it won't be exact. Plus, I'll probably want to delete a few things. Is this really worth doing? It's hard for me to see this as a major issue. (December, 2011)
Vasik Rajlich: During my tuning I used ints, but much finer than pawn=3200. I needed to be able to "perturb" each eval weight minimally and calculate the delta for the fit between eval scores and game results. This is the "gradient" part of gradient descent. (December 2011)
Vas created the Rybka 1 PST's with his own written code in C# and he (in principle) is willing to show it.
So much more likely, that is of course if you think VII.
What I dislike about this whole issue (and this is not about you Jeremy) is that the main accusers Mark and Zach are not willing to give in that their PST theory is based on VIG and are not able to admit a mistake. They consistently refuse to give Miguel the credit he deserves for overlooking a couple of things Mark and Zach could not imagine at the time they wrote down the PST accusations in their documents.