Information Theory and the Game of JOTTO

The word game, JOTTO, has attracted the interest of several computer programmers over the years, not to mention countless devoted players. Rules are: 1.) Each of 2 players selects a 5-letter English word, or a proper noun, as his "secret word." 2.) Play consists of alternate turns of namin...

Full description

Bibliographic Details
Main Author: Beeler, Michael
Language:en_US
Published: 2004
Online Access:http://hdl.handle.net/1721.1/6192
_version_ 1826195805283811328
author Beeler, Michael
author_facet Beeler, Michael
author_sort Beeler, Michael
collection MIT
description The word game, JOTTO, has attracted the interest of several computer programmers over the years, not to mention countless devoted players. Rules are: 1.) Each of 2 players selects a 5-letter English word, or a proper noun, as his "secret word." 2.) Play consists of alternate turns of naming a "test word, whose constraints are the same as ton the secret words, and the opponent answering how close the test word is to his secret word. 3.) Closeness is measured in jots; each jot is a one-to-one letter match, and independent of which word is the test word. GLASS versus SMILE or SISSY is 2 jots. 4.) The first payer to guess his opponent's secret word wins. Constraints on a JOTTO program are; First, it must have a dictionary of all possible words at the outset of each game. (The modification of adding newly experienced words to its dictionary is trivial in practice ad not worth the programming efforts, especially since one wants to avoid adding word-like typing errors, etc.) the 9unacceptable) alternative is to have a letter-deducing algorithm and then a "word-proposer" to order the 5 factorial = 120 combinations (perhaps based on diagram frequencies and vowel constraints) once all 5 letters are found. Second, the most use the program can make of the jots from a given test word is to eliminate from its list of "possible secret words of opponent" all those which do not have that number of jots against that test word. Hence, each test word should be chosen to maximize the expected information derived.
first_indexed 2024-09-23T10:15:43Z
id mit-1721.1/6192
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T10:15:43Z
publishDate 2004
record_format dspace
spelling mit-1721.1/61922019-04-11T07:57:55Z Information Theory and the Game of JOTTO Beeler, Michael The word game, JOTTO, has attracted the interest of several computer programmers over the years, not to mention countless devoted players. Rules are: 1.) Each of 2 players selects a 5-letter English word, or a proper noun, as his "secret word." 2.) Play consists of alternate turns of naming a "test word, whose constraints are the same as ton the secret words, and the opponent answering how close the test word is to his secret word. 3.) Closeness is measured in jots; each jot is a one-to-one letter match, and independent of which word is the test word. GLASS versus SMILE or SISSY is 2 jots. 4.) The first payer to guess his opponent's secret word wins. Constraints on a JOTTO program are; First, it must have a dictionary of all possible words at the outset of each game. (The modification of adding newly experienced words to its dictionary is trivial in practice ad not worth the programming efforts, especially since one wants to avoid adding word-like typing errors, etc.) the 9unacceptable) alternative is to have a letter-deducing algorithm and then a "word-proposer" to order the 5 factorial = 120 combinations (perhaps based on diagram frequencies and vowel constraints) once all 5 letters are found. Second, the most use the program can make of the jots from a given test word is to eliminate from its list of "possible secret words of opponent" all those which do not have that number of jots against that test word. Hence, each test word should be chosen to maximize the expected information derived. 2004-10-04T14:45:20Z 2004-10-04T14:45:20Z 1971-08-01 AIM-218 http://hdl.handle.net/1721.1/6192 en_US AIM-218 1538076 bytes 185132 bytes application/postscript application/pdf application/postscript application/pdf
spellingShingle Beeler, Michael
Information Theory and the Game of JOTTO
title Information Theory and the Game of JOTTO
title_full Information Theory and the Game of JOTTO
title_fullStr Information Theory and the Game of JOTTO
title_full_unstemmed Information Theory and the Game of JOTTO
title_short Information Theory and the Game of JOTTO
title_sort information theory and the game of jotto
url http://hdl.handle.net/1721.1/6192
work_keys_str_mv AT beelermichael informationtheoryandthegameofjotto