Chapter 8 – Lambdamoo-Specific Reference Information
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Player Traits and Gratifications of Casual and Hardcore Players of Pokémon GO, Harry Potter: Wizards Unite, and Ingress
Player Traits and Gratifications of Casual and Hardcore Players of Pokémon GO, Harry Potter: Wizards Unite, and Ingress JOHN DUNHAM, Niantic x RIT Geo Games and Media Research Lab, Rochester Institute of Technology, USA KONSTANTINOS PAPANGELIS, Niantic x RIT Geo Games and Media Research Lab, Rochester Institute of Technology, USA NICOLAS LALONE, University of Nebraska Omaha, USA YIHONG WANG, University of Liverpool, UK Location-based games (LBG) impose virtual spaces on top of physical locations. Studies have explored LBG from various perspectives. However, a comprehensive study of who these players are, their traits, their gratifications, and the links between them is conspicuously absent from the literature. In this paper, weaim to address this lacuna through a series of surveys with 2390 active LBG players utilizing Tondello’s Player Traits Model and Scale of Game playing Preferences, and Hamari’s scale of LBG gratifications. Our findings (1) illustrate an association between player satisfaction and social aspects of the studied games, (2) explicate how the core-loops of the studied games impact the expressed gratifications and the affine traits of players, and (3) indicate a strong distinction between hardcore and casual players based on both traits and gratifications. Overall our findings shed light into the players of LBG, their traits, and gratifications they derive fromplaying LBGs. CCS Concepts: • Human-centered computing ! Human computer interaction (HCI); Collaborative and social computing. Additional Key Words and Phrases: Location-based Games, Player Traits, Gratifications, Pokémon GO, Harry Potter: Wizards Unite, Ingress ACM Reference Format: John Dunham, Konstantinos Papangelis, Nicolas LaLone, and Yihong Wang. 2018. Player Traits and Gratifica- tions of Casual and Hardcore Players of Pokémon GO, Harry Potter: Wizards Unite, and Ingress. -
GENDER SWAPPING on the INTERNET Amy S. Bruckman Presented at the Internet Society, San Fransisco, CA, August 1993
GENDER SWAPPING ON THE INTERNET Amy S. Bruckman Presented at The Internet Society, San Fransisco, CA, August 1993. ABSTRACT In text-based virtual reality environments on the Internet called MUDs, it is possible to pretend to be the opposite gender. In these virtual worlds, the way gender structures basic human interaction is often noticed and reflected upon. This paper introduces MUDs, and then presents a community discussion about gender issues that MUDs inspired. Gender swapping is one example of ways in which network technology can impact not just work practice but also culture and values. I. GENDER SWAPPING ON THE INTERNET On the television show Saturday Night Live, a series of skits concerned a character named Pat, who has no apparent gender. The audience is tempted with the promise of clues. In one episode, Pat gets his or her hair cut. A sign in the salon says that men's haircuts are $7, and women's haircuts are $9. The audience waits in suspense: when Pat goes to pay, his or her true gender will be revealed. The humor of the series lies in the fact that those hopes are constantly foiled; in this instance, Pat leaves $10 and says to keep the change. Gender is so fundamental to human interactions, that the idea of a person without gender is absurd. The audience thinks that surely some clue must reveal Pat's gender, but none ever does. Many who have never seen Saturday Night Live know about Pat.(2) The character has become a kind of cultural icon. Pat's popularity is revealing. -
Yib's Guide to Mooing
Yib’s Guide to MOOing Getting the Most from Virtual Communities on the Internet Elizabeth Hess Table of Contents Foreword....................................................................................................................iii Acknowledgements.....................................................................................................v Introduction ...............................................................................................................1 Part I Fundamentals ...................................................................................................5 Chapter 1 – The Basics ................................................................................................7 Getting Started........................................................................................................7 Basic Communications............................................................................................9 Requesting a Character and Getting Settled In ...................................................... 14 Chapter 2 – How Do They Do That?.......................................................................... 21 Overview............................................................................................................... 21 A Very Brief Introduction to Objects ..................................................................... 21 Exploring an Object-Oriented World..................................................................... 22 Moving Around in a MOO................................................................................... -
""° Po0 Communications 0$ Forum
Dewey i4 HE760O@ .S46 0*0 ""° PO0 COMMUNICATIONS 0$ FORUM "Democracy in Cyberspace: Society, Politics and the Virtual Republic" 5 May 1994 MIT COMMUNICATIONS FORUM ROOM E40-242A CAMBRIDGE, MA 02139 (617) 253-3144 J MASSACHUSETTS INSTITUTE OF TECHNOLOGY MASSACHUSETTS INSTITUTE OF TECHNOLOGY COMMUNICATIONS FORUM "Democracy in Cyberspace: Society, Politics and the Virtual Republic" 5 May 1994 Julian Dibbell The Village Voice Amy Bruckman The Media Lab Massachusetts Institute of Technology F. Randall Farmer Electric Communications Dr. Martin Roberts, Moderator Foreign Languages and Literature, Film and Media Studies Massachusetts Institute of Technology Kelly M. Greenhill, Rapporteur Graduate Student, Department of Political Science Massachusetts Institute of Technology L MASSACHUSETTS INSTITUTE OF TECHNOLOGY COMMUNICATIONS FORUM "Democracy in Cyberspace: Society, Politics and the Virtual Republic" 5 May 1994 The MIT Communications Forum gratefully acknowledges its support: Ascom Timeplex Bellcore CSELT GTE Laboratories, Inc. Motorola, Inc. Naval Undersea Systems Center Nokia Olivetti, SpA Polaroid Corporation Telefonica Group Telia Research AB L ~ Moderator MARTIN ROBERTS [MR]: Good afternoon everyone. You are sitting in the. a spacious. comfortable auditorium in the basement of Building E-15 on the M.I.T. campus. It is a rainy afternoon, at the beginning of a Communications Forum entitled. "Democracy in Cyberspace: Society, Politics, and the Virtual Republic." There is an atmosphere of expectation in the air as people continue to drift in and take their seats. You look around, recognizing the same old faces and noticing a few new ones. Obvious exits are down then left, or up and out of the auditorium. The forum has already begun. At the front of the auditorium, the proceedings are being opened by Martin. -
5 Mud Spells
1. I AN INTRODUCTION TO MUD I I i Duncan Howard I Century Communications - London - CONTENTS INTRODUCTION by Richard Bartle I Chapter I A day in the death of an adventurer 7 Chapter 2 What is MUD? II Chapter 3 MUD commands 19 Chapter 4 Fighting in MUD 25 Chapter 5 MUD spells 29 Chapter 6 Monsters 35 Chapter 7 Treasure in MUD 37 Chapter 8 Wizards and witches 43 Chapter 9 Places in the Land 47 Chapter IO Daemons 53 Chapter II Puzzles and mazes 55 Chapter I2 Who's who in MUD 63 © Copyright MUSE Ltd 1985 Chapter I3 A specktackerler Christmas 71 All rights reserved Chapter I4 In conclusion 77 First published in 1985 by Appendix A A logged game of MUD 79 Century Communications Ltd Appendix B Useful addresses 89 a division of Century Hutchins~n Brookmount House, 62-65 Chandos Place, Covent Garden, London WC2N 4NW ISBN o 7126 0691 2 Originated by NWL Editorial Services, Langport, Somerset, TArn 9DG Printed and bound in Great Britain by Hazell, Watson & Viney, Aylesbury, Bucks. INTRODUCTION by Richard Bartle The original MUD was conceived, and the core written, by Roy Trubshaw in his final year at Essex University in 1980. When I took over as the game's maintainer and began to expand the number of locations and commands at the player's disposal I had little inkling of what was going to happen. First it became a cult among the university students. Then, with the advent of Packet Switch Stream (PSS), MUD began to attract players from outside the university - some calling from as far away as the USA and Japan! MUD proved so popular that it began to slow down the Essex University DEC-ro for other users and its availability had to be restricted to the middle of the night. -
Gramma -- Alison Mcmahan: Verbal-Visual-Virtual: a Muddy History
Gramma -- Alison McMahan: Verbal-Visual-Virtual: A MUDdy History http://genesis.ee.auth.gr/dimakis/Gramma/7/03-Mcmahan.htm Verbal-Visual-Virtual: A MUDdy History Alison McMahan In his book, The Rise of the Network Society, Manuel Castells approaches the idea of a networked society from an economic perspective. He claims that “Capitalism itself has undergone a process of profound restructuring”, a process that is still underway. “As a consequence of this general overhauling of the capitalist system…we have witnessed… the incorporation of valuable segments of economies throughout the world into an interdependent system working as a unit in real time… a new communication system, increasingly speaking a universal, digital language” (Castells 1). Castells points out that this new communications system and the concomitant social structure has its effects on how identity is defined. The more networked we are, the more priority we attach to our sense of individual identity; “societies are increasingly structured around a bipolar opposition between the Net and the Self ” (3). He defines networks as follows: A network is a set of interconnected nodes. A node is the point at which a curve intersects itself. What a node is, concretely speaking, depends on the kind of concrete networks of which we speak. Networks are open structures, able to expand without limits, integrating new nodes as long as they are able to communicate within the network…. A network-based social structure is a highly dynamic, open system, susceptible to innovating without threatening its balance. [The goal of the network society is] the supersession of space and the annihilation of time. -
Mud Connector
Archive-name: mudlist.doc /_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/ /_/_/_/_/ THE /_/_/_/_/ /_/_/ MUD CONNECTOR /_/_/ /_/_/_/_/ MUD LIST /_/_/_/_/ /_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/ o=======================================================================o The Mud Connector is (c) copyright (1994 - 96) by Andrew Cowan, an associate of GlobalMedia Design Inc. This mudlist may be reprinted as long as 1) it appears in its entirety, you may not strip out bits and pieces 2) the entire header appears with the list intact. Many thanks go out to the mud administrators who helped to make this list possible, without them there is little chance this list would exist! o=======================================================================o This list is presented strictly in alphabetical order. Each mud listing contains: The mud name, The code base used, the telnet address of the mud (unless circumstances prevent this), the homepage url (if a homepage exists) and a description submitted by a member of the mud's administration or a person approved to make the submission. All listings derived from the Mud Connector WWW site http://www.mudconnect.com/ You can contact the Mud Connector staff at [email protected]. [NOTE: This list was computer-generated, Please report bugs/typos] o=======================================================================o Last Updated: June 8th, 1997 TOTAL MUDS LISTED: 808 o=======================================================================o o=======================================================================o Muds Beginning With: A o=======================================================================o Mud : Aacena: The Fatal Promise Code Base : Envy 2.0 Telnet : mud.usacomputers.com 6969 [204.215.32.27] WWW : None Description : Aacena: The Fatal Promise: Come here if you like: Clan Wars, PKilling, Role Playing, Friendly but Fair Imms, in depth quests, Colour, Multiclassing*, Original Areas*, Tweaked up code, and MORE! *On the way in The Fatal Promise is a small mud but is growing in size and player base. -
How to Convert Your Ideas Into Reality a Circlemud Coding Manual
How To Convert Your Ideas Into Reality A CircleMUD Coding Manual Jeremy Elson and the rest of the CircleMUD Group <[email protected]> Section 4 written by Luis Pedro Passos Carvalho <[email protected]> November 17, 2002 Abstract This is a guide to writing C code for use with CircleMUD. Includes a description of com- monly used functions, tips on how to add new commands and spells, and other commonly asked coding questions. Good familiarity with both C and UNIX is assumed, although system-level UNIX C programming skill not required. The intended audience is for CircleMUD coders, and this document does not cover area-building. See the building document for details on that. More information about CircleMUD, including up-to-date versions of this documenta- tion in ASCII and Postscript, can be found at the CircleMUD Home Page <http://www. circlemud.org/> or FTP site <ftp://ftp.circlemud.org/pub/CircleMUD/ > Contents 1 Introduction 3 2 Overview and Coding Basics 5 2.1 An Internet Server Tutorial . 5 2.2 The Way Things Work – Overview . 8 2.2.1 Boot Phase . 8 2.2.2 Interactive Phase . 11 1 2.2.3 Shutting Down . 13 2.3 CircleMUD’s Global Variables . 14 2.3.1 World Variables . 14 2.3.2 Object Instance Lists . 15 2.3.3 Other . 15 2.4 Frequently Used Functions . 15 2.4.1 Basic String Handling . 15 2.4.2 Argument Processing . 16 2.4.3 Character Output (Hello, world!) . 17 2.4.4 File Input . 17 2.4.5 Utility Functions . 18 2.4.6 Character/Object Manipulation . -
The Laws of the Virtual Worlds
California Law Review VOL. 92 JANUARY 2004 No. 1 Copyright © 2004 by California Law Review, Inc., a California Nonprofit Corporation The Laws of the Virtual Worlds F. Gregory Lastowkat & Dan Hunterl TABLE OF CONTENTS Introduction .............................................................................................3 A . V irtual W orlds ...........................................................................4 B. On the Real and the Virtual .......................................................7 I. A Virtual-World Primer ..................................................................14 A . W riting the W orld ....................................................................14 B. Drawing the World ..................................................................21 II. V irtual Properties ..........................................................................29 A. The Existence of Property in Virtual Worlds ...........................30 B. Early Conceptions of Virtual Property .....................................34 C. The Descriptive Account of Virtual Property .......................... 37 1. Metaphysical Problems ....................................................40 2. Temporal Problems ...........................................................42 D. The Normative Account of Virtual Property ............................43 1. Utilitarian Theories of Virtual Property ............................44 2. Lockean Theories of Virtual Property ...............................46 3. Personality Theories of Virtual Property ............................48 -
Ancient Greece and Rome in Videogames: Representation, Player Processes, and Transmedial Connections
Ancient Greece and Rome in Videogames: Representation, Player Processes, and Transmedial Connections Thesis submitted in accordance with the requirements of the University of Liverpool for the degree of Doctor of Philosophy By Ross Clare September 2018 Abstract Videogames are a hugely popular entertainment medium that plays host to hundreds of different ancient world representations. They provide very distinctive versions of recreated historical and mythological spaces, places, and peoples. The processes that go into their development, and the interactive procedures that accompany these games, must therefore be equally unique. This provides an impetus to both study the new ways in which ancient worlds are being reconfigured for gameplayers who actively work upon and alter them, and to revisit our conception of popular antiquity, a continuum within popular culture wherein ancient worlds are repeatedly received and changed in a variety of media contexts. This project begins by locating antiquity within a transmedial framework, permitting us to witness the free movement of representational strategies, themes, subtexts and ideas across media and into ancient world videogames. An original approach to the gameplay process, informed by cognitive and memory theory, characterises interaction with virtual antiquity as a procedure in which the receiver draws on preconceived notions and ideas of the ancient past to facilitate play. This notion of “ancient gameplay” as a reception process fed by general knowledges, previous pop-cultural engagements, and dim resonances of antiquity garnered from broad, informal past encounters allows for a wide, all-encompassing study of “ancient games”, the variety of sources they (and the player) draw upon, and the many experiences these games offer. -
Table of Contents
Table of Contents 1. TrekMUSE, 3:30 AM ................................................................................................ 1 2. Introduction .............................................................................................................. 4 2.1 MUDs, MUSEs, MUSHs, and MOOs ...................................................... 4 2.2 Adventure-Game-Style MUDs ................................................................. 5 2.3 Tiny-Style MUDs ........................................................................................ 7 2.4 Themed MUDs ........................................................................................... 10 2.4.1 Social Hierarchy .......................................................................... 12 2.4.2 Participatory Culture .................................................................. 13 2.5 Methodology ............................................................................................... 13 3. Identity ....................................................................................................................... 17 3.1 From the Virtual to the Real: A Party ...................................................... 17 3.2 From the Virtual to the Real: A Romance ............................................... 23 4. Gender Swapping .................................................................................................... 26 5. Mud Addiction ........................................................................................................ -
The Circlemud Administrator's Manual
The CircleMUD Administrator’s Manual Jeremy Elson <[email protected]> December 12, 2001 Abstract This document describes how to configure CircleMUD and how to compile it for the first time. It also discusses how to run the server including documentation of command- line options, a description of system logs and how to use them, and a description of daily and long-term maintenance required by the MUD. The intended audience is implementors new to CircleMUD or MUD administration in general. More information about CircleMUD, including up-to-date versions of this documen- tation in ASCII and Postscript, can be found at the CircleMUD Home Page <http:// www.circlemud.org/> or FTP site <ftp://ftp.circlemud.org/pub/CircleMUD/>. Contents 1 Welcome to CircleMUD! 3 1.1 Background and Introduction . 3 1.2 Are you a Player or an Administrator? . 4 1.3 So, you’re sure you want to run your own MUD? . 4 1.4 Giving Credit Where Credit is Due . 4 2 Getting Started 5 2.1 Section Requirements . 5 2.2 Downloading and Unpacking the Source . 6 1 2.3 Configuring CircleMUD . 7 2.4 Compiling CircleMUD . 7 3 Running CircleMUD 8 3.1 Execution and autorun ............................. 8 3.2 Command-Line Options . 9 3.3 Creating an Implementor Character . 10 4 Customizing CircleMUD 11 4.1 config.c ..................................... 11 4.2 Text Files . 11 4.3 World Files . 12 5 System Logs 12 5.1 Player Information . 12 5.2 Usage Information . 13 5.3 Errors . 14 6 MUD Maintenance 15 6.1 Technical Maintenance . 15 6.2 Diplomatic Maintenance .