Fundamentals of Game Design, Second Edition (Tim Cox's Library) by Ernest Adams
Author:Ernest Adams
Language: eng
Format: epub
Publisher: New Riders
Published: 2010-01-20T16:00:00+00:00
Dominant Strategies in Video Games
Video games seldom permit players to use strategies so strongly dominant that they absolutely guarantee victory, although some, whether PvP or PvE games, allow powerful strategies that give the player little reason to use any other. By far the best-known dominant strategy in any PvP video game is the tank rush in Westwood’s Command & Conquer: Red Alert. An experienced player playing as the Soviet side can devote all of his energies to producing a large force of tanks in the early part of the game, then use those tanks to attack the nascent enemy base en masse. Against an unprepared opponent, this almost always produces a victory; an experienced opponent can prepare for the onslaught, but the tank rush remains so effective that it takes the fun out of the game. Many players add an additional rule to the game—no tank rushes allowed—just to balance this problem.
Several editions of Madden NFL included unstoppable offensive plays that guaranteed success against an AI-controlled opponent. Fighting games, too, are especially prone to dominant strategies. In both fighting games and football games, the large numbers of possible combinations of offensive and defensive actions makes it difficult to test them all. Badly designed characters can also result in dominant strategies; in Super Street Fighter II Turbo, the secret character Akuma’s unbeatable attack, the air fireball, leaves the rest of the characters with no chance. Tournament matches ban the use of Akuma to ensure fair play.
The next few sections discuss ways that dominant strategies can emerge in a video game and how to avoid them or remove them by using balancing methods.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(20974)
Hello! Python by Anthony Briggs(20252)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(18611)
Dependency Injection in .NET by Mark Seemann(18407)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(17930)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(17690)
Kotlin in Action by Dmitry Jemerov(17588)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16939)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(16508)
Grails in Action by Glen Smith Peter Ledbrook(15651)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(13464)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(11540)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10582)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10484)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(9519)
Hit Refresh by Satya Nadella(9090)
The Kubernetes Operator Framework Book by Michael Dame(8527)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8350)
Robo-Advisor with Python by Aki Ranin(8296)