An Exploration Tool for Predicting Stealthy Behaviour Jonathan Tremblay∗, Pedro Andrade Torres∗, Nir Rikovitch† and Clark Verbrugge∗

An Exploration Tool for Predicting Stealthy Behaviour Jonathan Tremblay∗, Pedro Andrade Torres∗, Nir Rikovitch† and Clark Verbrugge∗

Artificial Intelligence in the Game Design Process 2: Papers from the 2013 AIIDE Workshop (WS-13-20) An Exploration Tool for Predicting Stealthy Behaviour Jonathan Tremblay∗, Pedro Andrade Torres∗, Nir Rikovitchy and Clark Verbrugge∗ ∗School of Computer Science yDepartment of Mechanical Engineering McGill University McGill University Montreal,´ Quebec,´ Canada Montreal,´ Quebec,´ Canada [email protected] [email protected] [email protected] [email protected] Abstract Our design is based on known AI techniques, tailored for efficiency, and adapted to the specific task of interactively Stealthy movement is an important part of many games in the First Person Shooter (FPS) and Role Playing Games (RPG) understanding sneaking behaviours. By integrating our tool genres. Structuring a game level to match stealth goals, how- into Unity 3D (Unity Technologies 2013), a full featured, ever, is difficult, and can depend on subtle and fragile inter- industry relevant tool for game development, we enable effi- actions between the game space, enemy motion, and other cient exploration during the game design phase, accelerating factors. Here we apply a probabilistic path-finding approach the process of prototyping and early-stage verification (Nel- to efficiently analyze a 2D space and find stealthy paths. This son and Mateas 2009). approach naturally accommodates variation in the level de- We verify our efforts on two non-trivial examples, as well sign, numbers and movements of enemies, fields of view, and as detailed performance analysis. The first example is moti- player start and goal placement. Our design is integrated di- vated by industry discussion of basic idioms in sneaking de- rectly into the Unity 3D game development framework, al- sign (Smith 2006), and demonstrates the complexity of even lowing for interactive and highly dynamic exploration of how different virtual spaces and enemy configurations affect the these simple interactions. A second example tests a more in- potential for stealthly movement by players, or other NPCs. volved context, reproducing a level design from Metal Gear Solid (MGS) (Konami Digital Entertainment 1998), and is intended to show our tool design scales to realistic contexts. Introduction Stealthly movement is a critical component of gameplay Background & Related Work for many games. With respect to players, the existence of Use of stealth in games can be inherent to the game design, stealth-based approaches provides variety and further strate- although it is more typically part of a separate, but coexisting gic choices in approaching combat. NPCs also benefit from form of gameplay with a distinct movement and interaction understanding stealth, as failure to recognize and follow a model (i.e., a separate stealth mode). In either case a stealth player’s sneaking behaviour can either interfere with player game (or level) is simply defined in terms of presenting a strategy by accidentally inducing combat (a frequent prob- challenge for the player to get from one location to another, lem in Skyrim (Bethesda Game Studios 2011)), or result while avoiding detection by static and mobile enemies. in immersion–breaking visual artifacts as enemies fail to The challenge of being stealthy can then be mitigated acknowledge overtly non-stealthy NPC movements when through different game mechanics. In-game tools may be the player enters stealth mode (such as in The Last of provided to the player to aid in sneaking, such as use of Us (Naughty Dog 2013)). the cardboard box in the Metal Gear Solid (MGS) series, Ensuring an interaction scenario is amenable to stealthy arrows in the Thief series (Looking Glass Studios 1998), movement, however, is quite difficult. The existence of as well as special abilities, such as teleportation in Dishon- movement paths appropriate for sneaking depends on the ored (Arkane Studios 2012). Gameplay and challenge may complex interplay between enemy senses, enemy place- also be influenced by environmental factors: snow may leave ments and movements, the location and occlusions provided visible movement traces, metal floors or loose objects can be by virtual objects, and player starting and goal states. Tools noisy on contact, and light or shade may alter visibility pos- which allow for interactive exploration of how the poten- itively or negatively. When designing a level a designer has tial for stealth is affected as these factors are modified thus to take these variables into consideration, and combine them have obvious value, enabling better level design and pro- with the basic properties of enemy position and movement viding trace data or online mechanisms for improving NPC and detection abilities in order to build the right experience. behaviours when they accompany a sneaking player. Smith defines a level to be stealth friendly if the in-game In this work we design, implement, and test a tool for vi- tools that reduce detection are greater than the environmen- sualizing and exploring stealth paths in a 2D game level. tal challenges that increase it (Smith 2006). Copyright c 2013, Association for the Advancement of Artificial Stealth is also encountered as part of normal combat Intelligence (www.aaai.org). All rights reserved. preparation, where players seek to scout out the environ- 34 ment in order to gain knowledge about enemy movements can visualize the results and how the interface is designed. and placements. This usage constitutes less of a stealth game The input is defined by a designed level that includes ene- in itself, but does not change the main techniques involved. mies with predetermined movements (routes), different ge- Level Design Tools - Our approach in this work is to de- ometries that block movement and/or enemy vision, and the velop a tool to assist in stealth level design. Tool develop- player’s initial position and goal. The tool then outputs a ment is of course an important and large aspect of game re- map with (clustered) possible paths a player could take to search and development, and at its highest level includes full avoid detection. frameworks, such as UDK (Epic Games 2008) and Unity 3D We first describe the process that leads to this result. This (Unity Technologies 2013). Here we are interested specifi- requires discretization of the space, a pathfinding algorithm cally in tools that help the designer understand his or her de- to compute sneaking paths, and a clustering approach to signs. These kinds of tools use AI techniques that focus on summarize results. This theoretical discussion is followed how the inner structure of the game operates and structures by description of interface itself, as an important part of the the play experience. tool design. A number of other tool-oriented approaches have been Pre Computing - In order to find different paths a player described or developed that aim at extracting knowledge could take we need a formal model of the game state. from game artefacts or properties in order to better under- Enemy movements are assumed deterministic but possibly stand the resulting gameplay (Nelson 2011). Shi and Craw- non-linear and non-continuous, and their vision is a func- fis, for example, presented a design tool that computes met- tion of obstacles and their orientation. Discretization of this rics on the optimal path a player may find to get through space allows us to more easily model the game state as a a level, given obstacles and enemy distribution (Shi and function of time, and we thus compute the world state at dif- Crawfis 2013). They looked at the minimum damage cover, ferent times, t, based on constant intervals. This gives us a longest path and standard deviation of cover points. For 3D space to explore in order to find paths, as an extrusion of RTS games, more general terrain metrics are also germane. the 2D game level through time. Enemy vision is calculated Perkins’ Broodwar Terrain Analyzer showed a map decom- using ray-cast methods (Vandevenne 2007), and this allows position approach which allowed one to determine strate- the tool to define enemy vision (FoV) at each point in time. gically important choke points (Perkins 2010), and Reddad Rapidly Exploring Random Tree - We decided to use and Verbrugge compute geometric centrality and coverage an Rapidly exploring Random Tree (RRT) for pathfinding measures in order to better understand map quality (Reddad through our discretized space, as it offers a flexible and inex- and Verbrugge 2012). pensive way to explore a state space. The random behaviour Tools that specifically facilitate design have also been de- of the algorithm also allows the tool to easily represent a veloped. Liapis et al. presented a tool where designers could greater range of player behaviours. Here we describe the sketch levels using a high-level terrain editor (Liapis, Yan- general motion planning problem for an RRT algorithm. Our nakakis, and Togelius 2013). Given a map, the tool out- game context does not require this full generality, but a gen- puts metrics such as playability, balance, choke points, etc.; eral formulation enables further extension of our work. the tool also included suggestions for map improvements based on a genetic algorithm approach that tries to produce The General RRT Algorithm - Initially presented by playable maps. Tools that let the users enter a schematic for Kuffner and LaValle (LaValle and Kuffner, Jr 1999), RRT is a level are presented as computational caricature tools by an incremental, sampling-based, single-query motion plan- Smith and Mateas (Smith and Mateas 2011). Bauer et al. ner for holonomic systems. The RRT has proved extremely presented an extension of such caricature tool by letting it useful in exploring configuration spaces and ultimately gen- redesign the space of a level based on constraints given by erating trajectories for robotic systems, with some recent ap- the designer (Bauer, Cooper, and Zoran Popovic´ ). Their al- plications in games (Bauer and Popovic´ 2012).

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us