decryption↦heuristic, algorithm↦encryption
Strategies are logged into behavioral cloning. ![Pink Poem](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQs5kEfGW0t30-ZnR31d3vplOUKIv8_fvb_m2ZwFPiBMXnw9ARDN3IU1BJvsj_YETdTQ7P_2RZrdqYJO9y4fJWiOD5CzCK7YiNSJU3B9Jy3kiSPn7TAB-Exx3ejnrBE-CELChHhbotLiMS/s1600-rw/watermelon.png)
Our strategic goals are to find and exploit lower bounds on (the number of) plays it takes to arrive at a zero-bubble. (see touch-and-go, improvise, stewc notation, UUhistlegrass)
/// Strategies are typically non-brute force, and not
runtime
-dependent.