Analysis of Russian and global game studies: ludology vs. narratology
Consideration of scientific literature on the study of games from the point of view of ludology and narratology. Get an idea of the current state of research in ludology and narratology in various scientific fields. Method of quantitative research.
Подобные документы
Power Point – ???????????? ???????????? ?????-??????. ???????? ???????????: ?????????? ??????, ???????, ???????. ??????? ????? ?????????. ?????????? ?????? ?????? ? ????????????? ???????. ??????? ??????????. ?????? ??????? ? ???????? ????? ???????????.
??????????? ??????, добавлен 20.01.2013?????????? ? ????????????, ????????????? Power Point. ???????? ???????? ???????????, ????????? ? ??????? Microsoft Graph. ??????????? ???????? ?????????, ?????????? ??????????? ??????. ????? ? ?????? ???????????. ??????? ???????? ????????? ? ???????????.
???????? ??????, добавлен 27.12.2012Web Service Composition (WSC) is a process that helps to save much programming and cost effort by reusing existing components – web services. This paper presents an overview of current state-of-the-art Web Service Discovery and Selection methods.
??????, добавлен 07.12.2016?????????? ? Power Point. ?????? ?????????????? ? ????????????? ????????. ???????? ????? ???????????, ?????????? ????????? ?????? ? ??????? ???????? WordArt. ?????????????? ??????, ????????? ???????? ???? ???????, ?????? ? ????????? ? ????????? ???????.
???????? ??????, добавлен 04.08.2014- 105. ????? ProjectOZ
??????????? ProjectOZ. ?????????? ??????, ??????????????? ????????????? Microsoft. ????? ??????? ???????? CRK, ???? ? ?????????? ??????? ???????, ???????????? ???????????. ????????????????? ???? Windows Research Kernel, ??????? ??? ???????? ? ???????.
???????, добавлен 08.06.2011 - 106. ?????? ? Power Point
???????? ???????? ?????? ???????? ??????????? ? ????????? Power Point. ???????? ????????? ??????????? ???????? ???????. ????????? ????, ????????? ??????, ????????? ???? ? ????????? Adobe Photoshop, ??????? ? ????????. ?????????????? ????? ???????.
??????????? ??????, добавлен 21.06.2016 ???????????? ? ??????????????? ?????? ?? ????? ?????????? ????? ????????????? ???????????? ??????????? ???????????? ?????? Microsoft Office. ?????? ? ?????????? Microsoft Office, ?????? Power Point. ???????????????? ?????????? ?????????? ? ?????????.
???????, добавлен 02.05.2019????? ? ????????? ???????? ?????????????? ??????. ??????????? ??????????? MS Power Point, ????? ?? ??????????, ?????????, ???????, ????????. ??????????? MS PowerPoint ? ???????? ???????. ????? ??????, ??????? ?????? ? ???????? ??? ???????? SmartArt.
??????????? ??????, добавлен 04.02.2014??????? ?????? ??????? ??????????????? ?????? ?? ??????? ?????????, ????????? ????????????????? ??????? ?? Almaden Research Centre. ??????? ???????? ?????????????? ??????. ??????? ?????????? (???????????? ??????-?????). ?????????? ?????? Fm ??????.
???????, добавлен 16.08.2014The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.
?????, добавлен 13.03.2014- 111. Funds of the library
Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.
???????? ??????, добавлен 25.06.2017 ?????? ??????????? ??????? ?????, ????? ??????????? ? ??????????? ??????? ??? ??????????? ??????????? ?????? ?????. ???????????? Generic Routing Encapsulation, Point-to-Point Tunneling Protocol, ipSecurity. ????? ?????????? ??? ??????????? ??????.
????????? ??????, добавлен 19.06.2017Development of the program, applying the technique of surface voxelization of 3D-models based on graphic processes. Review of existing methods voxelization 3D-scenes view of the art surface voxelization. Analysis and results of performance tests.
????????? ??????, добавлен 11.07.2016The concept and structure, as well as the laws of functioning of the Unified Modeling Language, history of its development. Precedents and conditions of effective use case diagrams. Research of a example of computer simulation and evaluation of results.
???????????, добавлен 05.04.2016The study of the problems and solutions of insufficient quantity and quality of documentation that is created for software in recent decades. Create a discussion of current practices documentation to facilitate a detailed discussion in the future.
??????, добавлен 23.02.2016This article describes the main features of the design in 3D format. Demonstrated the usefulness of this method in the design and in the analysis. Presents basic examples of the practical application of data modeling functions for real design solutions.
??????, добавлен 28.09.2016Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
???????, добавлен 31.10.2012A study of the causes of the problematic situation regarding the use of software for financial and accounting of Russian production. Recommendations for further action are considered. Forming a policy for the introduction of new software products.
??????, добавлен 15.02.2021??????? ? ???? ????????? ???????????, ???????? ?????????? ????????? ?????????? ??????? ? ??????? ????. ??????? ?????? ? ???????? ?????????? ?????????? Microsoft Word, ??? ??????????? ? ??????????. ???????? ??????????? ??? ?????? ??????? ? MS Power Point.
??????????? ??????, добавлен 14.12.2010Research of the problem of training IT industry specialists, experience in teaching the basics of programming to educational applicants. Description of the Applied Technologies that contribute to the formation of competencies of IT industry specialists.
??????, добавлен 06.04.2023Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
??????, добавлен 29.11.2016? ?????? ??????????????? ??????? ???????? ??????, ???????? ?????????? ??? Zettelkasten, ??????????? ??????????? TheBrain, Roam Research, Obsidian, ???????????? ??? ???????? ?????. ????????? ????????? ?????????? ???????? ? ????????????, ?????????? ???.
??????, добавлен 17.06.2021The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
??????, добавлен 01.11.2021This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.
??????, добавлен 26.10.2020The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.
??????, добавлен 15.09.2012