A Novel Approach for Embedding and Traversing Problems in Serious Games

Abhishek Parakh, Mahadevan Subramaniam, Parvathi Chundi, Elliott Ostler

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents a novel approach for embedding and traversing problems in serious games. Given a set of concepts, problems built upon these concepts, and the complexities of the concepts, we propose an automatic mechanism that aids the game developers on which problems can be put on the same level and which problems must only be reachable when certain dependencies are met. The proposed network traversal algorithm allows the player/student to efficiently complete all the problems with increasing complexity at each step. The proposed approach is general purpose and has has been implemented in our quantum cryptography game, QuaSim.

Original languageEnglish (US)
Title of host publicationSIGITE 2020 - Proceedings of the 21st Annual Conference on Information Technology Education
PublisherAssociation for Computing Machinery, Inc
Pages229-235
Number of pages7
ISBN (Electronic)9781450370455
DOIs
StatePublished - Oct 7 2020
Event21st Annual Conference of the Special Interest Group in Information Technology Education, SIGITE 2020 - Virtual, Online, United States
Duration: Oct 7 2020Oct 9 2020

Publication series

NameSIGITE 2020 - Proceedings of the 21st Annual Conference on Information Technology Education

Conference

Conference21st Annual Conference of the Special Interest Group in Information Technology Education, SIGITE 2020
CountryUnited States
CityVirtual, Online
Period10/7/2010/9/20

Keywords

  • problem distribution and embedding
  • problem network traversal
  • quantum cryptography
  • serious games

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Artificial Intelligence
  • Computer Science Applications
  • Software

Fingerprint Dive into the research topics of 'A Novel Approach for Embedding and Traversing Problems in Serious Games'. Together they form a unique fingerprint.

Cite this