標(biāo)題: Titlebook: Retrogame Archeology; Exploring Old Comput John Aycock Book 2016 Springer International Publishing Switzerland 2016 Computer games.Computer [打印本頁] 作者: 生手 時(shí)間: 2025-3-21 16:51
書目名稱Retrogame Archeology影響因子(影響力)
書目名稱Retrogame Archeology影響因子(影響力)學(xué)科排名
書目名稱Retrogame Archeology網(wǎng)絡(luò)公開度
書目名稱Retrogame Archeology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Retrogame Archeology被引頻次
書目名稱Retrogame Archeology被引頻次學(xué)科排名
書目名稱Retrogame Archeology年度引用
書目名稱Retrogame Archeology年度引用學(xué)科排名
書目名稱Retrogame Archeology讀者反饋
書目名稱Retrogame Archeology讀者反饋學(xué)科排名
作者: 周年紀(jì)念日 時(shí)間: 2025-3-21 21:24
John Aycockdiscrete manufacturing. Sponsored by the International Federation for Information Processing (IFIP), the PROLAMAT is traditionally held every three years and it includes the whole area of advanced software technology for Design and Manufacturing in Discrete Manufacturing. Past editions of the Intern作者: 容易生皺紋 時(shí)間: 2025-3-22 03:10 作者: 結(jié)合 時(shí)間: 2025-3-22 06:49 作者: 開始沒有 時(shí)間: 2025-3-22 09:28 作者: 尖叫 時(shí)間: 2025-3-22 13:55 作者: EXUDE 時(shí)間: 2025-3-22 17:17
John Aycockto make mobile wireless a global phenomenon.Does not just co.Globalization of Mobile and Wireless Communications. is a collection of cutting-edge research in mobile and wireless communications with impact on developments as far forward as 2020 and beyond. The book draws upon the insights and perform作者: FOIL 時(shí)間: 2025-3-23 01:01
John Aycockto make mobile wireless a global phenomenon.Does not just co.Globalization of Mobile and Wireless Communications. is a collection of cutting-edge research in mobile and wireless communications with impact on developments as far forward as 2020 and beyond. The book draws upon the insights and perform作者: DALLY 時(shí)間: 2025-3-23 04:10 作者: glowing 時(shí)間: 2025-3-23 05:36
John Aycockto make mobile wireless a global phenomenon.Does not just co.Globalization of Mobile and Wireless Communications. is a collection of cutting-edge research in mobile and wireless communications with impact on developments as far forward as 2020 and beyond. The book draws upon the insights and perform作者: 防御 時(shí)間: 2025-3-23 13:12 作者: 不能和解 時(shí)間: 2025-3-23 14:55 作者: 簡(jiǎn)潔 時(shí)間: 2025-3-23 21:34 作者: neutralize 時(shí)間: 2025-3-24 01:41
https://doi.org/10.1007/978-3-319-30004-7Computer games; Computer systems; Computing history; Data compression; Code obfuscation; Memory managemen作者: 代替 時(shí)間: 2025-3-24 05:06
Introduction,This first chapter sets the stage for the remainder of the book, examining what a retrogame actually . (there are many subtle nuances) and the constraints that underlie later topics. It also provides a brief introduction to a common CPU driving retrogames, the 6502, along with the pseudo-assembly syntax used in the book.作者: alcohol-abuse 時(shí)間: 2025-3-24 10:10
Memory Management,Not only do the memory management techniques used in retrogames underlie those seen in modern operating systems, but memory and its management continues to be an issue, like fitting data into caches and trading space for time.作者: transplantation 時(shí)間: 2025-3-24 11:11
Interpreters,Interpretation is widely used to implement a lot of popular programming languages today. There are a number of retrogame examples that use interpreters; text adventure/interactive fiction games used them extensively for portability and size considerations, but there are also examples from arcade, pinball, and action-based games.作者: fiscal 時(shí)間: 2025-3-24 18:44
Data Compression,As a rule, our data needs continually outstrip our capacity to store it and get it from one place to another, making data compression a highly relevant topic even now. Retrogames had the extra incentive of having to fit in limited memory and secondary storage, and they employed various techniques to compress both text and images.作者: 故意釣到白楊 時(shí)間: 2025-3-24 22:08 作者: declamation 時(shí)間: 2025-3-25 01:49
Protection,Now, as in the retrogame era, protecting code from analysis and copying is a concern and an active area of study. Protection schemes both old and new can be viewed through the lens of computer security.作者: DAUNT 時(shí)間: 2025-3-25 05:48
Obfuscation and Optimization,Protecting code naturally overlaps with code optimizations, as heavily-optimized code may be indistinguishable from obfuscated code. Some games owed their existence to extensive code optimizations: it was the only way they were possible on such constrained platforms.作者: agonist 時(shí)間: 2025-3-25 10:30
Endgame,This final chapter provides an opportunity to place retrogame archeology in a more general context of historical and game studies work, and also a chance to reiterate the main ideas that are relevant to modern programmers.作者: DEFT 時(shí)間: 2025-3-25 12:11
John AycockThe only book of its kind broadly examining retrogame implementation and its modern applications.Real examples widely drawn from over 100 games spanning twenty years and a variety of computing platfor作者: Anal-Canal 時(shí)間: 2025-3-25 19:19 作者: SPECT 時(shí)間: 2025-3-25 21:33 作者: Confidential 時(shí)間: 2025-3-26 03:00
Book 2016pers faced incredible challenges of limited space, computing power, rudimentary tools, and the lack of homogeneous environments. .Using examples from over 100 retrogames, this book examines the clever implementation tricks that game designers employed to make their creations possible, documenting th作者: 輕彈 時(shí)間: 2025-3-26 05:54 作者: 改變立場(chǎng) 時(shí)間: 2025-3-26 08:53 作者: POWER 時(shí)間: 2025-3-26 15:48
John Aycockhnological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined..978-94-007-3440-1978-94-007-0107-6Series ISSN 1860-4862 Series E-ISSN 1860-4870 作者: 大漩渦 時(shí)間: 2025-3-26 18:06 作者: Paleontology 時(shí)間: 2025-3-26 23:28
John Aycockhnological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined..978-94-007-3440-1978-94-007-0107-6Series ISSN 1860-4862 Series E-ISSN 1860-4870 作者: 陰謀 時(shí)間: 2025-3-27 02:17 作者: 祖先 時(shí)間: 2025-3-27 06:10
John Aycockhnological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined..978-94-007-3440-1978-94-007-0107-6Series ISSN 1860-4862 Series E-ISSN 1860-4870 作者: Gnrh670 時(shí)間: 2025-3-27 10:09
John Aycockhnological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined..978-94-007-3440-1978-94-007-0107-6Series ISSN 1860-4862 Series E-ISSN 1860-4870 作者: 減弱不好 時(shí)間: 2025-3-27 14:44 作者: 言外之意 時(shí)間: 2025-3-27 21:44 作者: 不舒服 時(shí)間: 2025-3-27 22:56
neration, and software protection. .Retrogame Archeology targets professionals and advanced-level students in computer science, engineering, andmathematics but would also be of interest to retrogame enthusiasts, computer historians, and game studies researchers in the humanities. ? ? ?978-3-319-80703-4978-3-319-30004-7作者: 微不足道 時(shí)間: 2025-3-28 03:14
Book 2016gets professionals and advanced-level students in computer science, engineering, andmathematics but would also be of interest to retrogame enthusiasts, computer historians, and game studies researchers in the humanities. ? ? ?作者: 艱苦地移動(dòng) 時(shí)間: 2025-3-28 07:29 作者: 萬神殿 時(shí)間: 2025-3-28 14:02
John Aycockext PROLAMAT. Under the title: The globalization of manufacturing in the digital communications eraof the 21th century: innovation, agility and the virtual enterprise, the 1998 conference expands the PROLAMAT scope to include teams and virtual enterprises which come together across space and time to作者: Kidney-Failure 時(shí)間: 2025-3-28 16:50 作者: 熒光 時(shí)間: 2025-3-28 19:18