Essays about: "3d game thesis"
Showing result 1 - 5 of 92 essays containing the words 3d game thesis.
-
1. The State of Live Facial Puppetry in Online Entertainment
University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : Avatars are used more and more in online communication, in both games and socialmedia. At the same time technology for facial puppetry, where expressions of the user aretransferred to the avatar, has developed rapidly. READ MORE
-
2. Radar and sea clutter simulation with Unity 3D game engine
University essay from Linköpings universitet/Programvara och systemAbstract : Game engines are well known for their use in the gaming industry but are starting to have an impact in other areas as well. Architecture, automotive, and the defence industry are today using these engines to visualise and, to some extent, test their products. READ MORE
-
3. A designer-driven approach to procedural generation tools for level design
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Game development is a multifaceted field that involves both traditional software practices and creative work. It is characterized by its iterative and time-consuming process where prototypes are created and then evaluated. This is especially true for creating 3D environments, where it is difficult to evaluate the quality before it is completed. READ MORE
-
4. Performance comparison of WebGPU and WebGL in the Godot game engine
University essay from Blekinge Tekniska Högskola/Fakulteten för datavetenskaperAbstract : Background. For rendering graphics on the web, WebGL has been the standard API to employ over the years. A new technology, WebGPU, has been set to release in 2023 and utilizes many of the novel rendering approaches and features common for the native modern graphics APIs, such as Vulkan. READ MORE
-
5. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE