Article 891 of rec.games.corewar: From: sadkins@bigbird.cs.ohiou.edu (Scott W. Adkins) Newsgroups: rec.games.corewar Subject: Spreader 2.0 Message-ID: <1992May11.021250.15671@oucsace.cs.ohiou.edu> Date: 11 May 92 02:12:50 GMT Sender: usenet@oucsace.cs.ohiou.edu (Network News Poster) Organization: Ohio University CS Dept., Athens Lines: 123 Ok, here is another program that has also been doing very well, wandering around the top 10, and sometimes as high as 5th place... Depending on its mood... :-) The basic idea of this program is to set up a heavy defense barrier, allowing programs to fall into its trap, only to get plowed over by the bombing. To add a little to the offensiveness of the program, I also starting two copying routines, moving in opposite directions in the core which cleans out the core as it is being copies. I spent a lot of time tweaking the constants, and figure that the only way to spead it up any more is to go to scanning the core as opposed to blindly bombing. That might be for Spreader 3.0 :-) Scott Adkins sadkins@ohiou.edu ------------------------------------------------------------------------------ ;redcode-x verbose ;name Spreader 2.0 ;author Scott Adkins ;kill Spreader ; ;strategy By the use of copying some heavy-duty bombing programs to the ;strategy extremeties of the write limit, this program effectively bombs ;strategy 1100 memory locations quickly and thorougly. Just in case the ;strategy enemy program does not venture into this war zone, two bombing ;strategy programs are sent out into the core in opposite directions to ;strategy clean everything else out. ; length equ dst1-pest1+100 source equ dst1-src1+100 output1 equ -15 output2 equ 200 pest1 mov #length, count1 mov #source, src1 mov #output1, dst1 move1 mov scan2c mov bomb2, >scan2c mov bomb2, >scan2c mov bomb2, >scan2c mov bomb2, >scan2c scan2b djn scan2a, #50 mov #50, scan2b mov #1, scan2c scan2c jmp scan2a, #1 kill2a mov bomb2, >kill2i kill2b mov bomb2, >kill2i kill2c mov bomb2, >kill2i kill2d mov bomb2, >kill2i kill2e mov bomb2, >kill2i kill2f djn kill2a, #50 kill2g mov #50, kill2f kill2h mov #1, kill2i kill2i jmp kill2a, #1 bomb2 dat #0, #0 copy2 mov kill2a, 250 mov kill2b, 250 mov kill2c, 250 mov kill2d, 250 mov kill2e, 250 mov kill2f, 250 mov kill2g, 250 mov kill2h, 250 mov kill2i, 250 spl 241 jmp scan2a pest2 mov #length, count2 mov #source, src2 mov #output2, dst2 move2 mov