18,848 research outputs found

    Game Engine Conventions and Games that Challenge them: Subverting Conventions as Metacommentary

    Get PDF
    Consumer-grade game engines such as Multimedia Fusion and RPG Maker have dramatically extended the reach of digital games as a medium. They have also spawned online communities, where conventions and canons of using these tools have evolved. These partly stem from the functional constraints of the game engines themselves and are institutionalized through manuals, examples, tutorials, and games made with them. However, some members of game engine communities actively seek to challenge these conventions by experimenting with the engines and finding ingenious ways to put them to unexpected uses. Such experiments can be regarded as a form of metacommentary on the engines’ capabilities and limitations. While arguably impractical and inefficient, they enrich the scope of what can be done with the engine and can contribute to its further development

    Advanced Artificial Intelligence Technology Testbed

    Get PDF
    The Advanced Artificial Intelligence Technology Testbed (AAITT) is a laboratory testbed for the design, analysis, integration, evaluation, and exercising of large-scale, complex, software systems, composed of both knowledge-based and conventional components. The AAITT assists its users in the following ways: configuring various problem-solving application suites; observing and measuring the behavior of these applications and the interactions between their constituent modules; gathering and analyzing statistics about the occurrence of key events; and flexibly and quickly altering the interaction of modules within the applications for further study

    Let's mix it up: interviews exploring the practical and technical challenges of interactive mixing in games

    Get PDF
    Game audio has come a long way since the simple electronic beeps of the early 1970s, when significant technical constraints governed the scope of creative possibilities. Recent years have witnessed technological advancements on an unprecedented scale; no sooner is one technology introduced than it is superseded by another, boasting a range of new refinements and enhanced performance

    Exploring Cyberbullying and Other Toxic Behavior in Team Competition Online Games

    Full text link
    In this work we explore cyberbullying and other toxic behavior in team competition online games. Using a dataset of over 10 million player reports on 1.46 million toxic players along with corresponding crowdsourced decisions, we test several hypotheses drawn from theories explaining toxic behavior. Besides providing large-scale, empirical based understanding of toxic behavior, our work can be used as a basis for building systems to detect, prevent, and counter-act toxic behavior.Comment: CHI'1

    A taxonomy of approaches for integrating attack awareness in applications

    Get PDF
    Software applications are subject to an increasing number of attacks, resulting in data breaches and financial damage. Many solutions have been considered to help mitigate these attacks, such as the integration of attack-awareness techniques. In this paper, we propose a taxonomy illustrating how existing attack awareness techniques can be integrated into applications. This work provides a guide for security researchers and developers, aiding them when choosing the approach which best fits the needs of their application

    The effects of change decomposition on code review -- a controlled experiment

    Get PDF
    Background: Code review is a cognitively demanding and time-consuming process. Previous qualitative studies hinted at how decomposing change sets into multiple yet internally coherent ones would improve the reviewing process. So far, literature provided no quantitative analysis of this hypothesis. Aims: (1) Quantitatively measure the effects of change decomposition on the outcome of code review (in terms of number of found defects, wrongly reported issues, suggested improvements, time, and understanding); (2) Qualitatively analyze how subjects approach the review and navigate the code, building knowledge and addressing existing issues, in large vs. decomposed changes. Method: Controlled experiment using the pull-based development model involving 28 software developers among professionals and graduate students. Results: Change decomposition leads to fewer wrongly reported issues, influences how subjects approach and conduct the review activity (by increasing context-seeking), yet impacts neither understanding the change rationale nor the number of found defects. Conclusions: Change decomposition reduces the noise for subsequent data analyses but also significantly supports the tasks of the developers in charge of reviewing the changes. As such, commits belonging to different concepts should be separated, adopting this as a best practice in software engineering
    corecore