Journal of Real-Time Image Processing

, Volume 9, Issue 3, pp 523–530 | Cite as

Analyzing repetitive action in game based on sequence pattern matching

Special Issue Paper

Abstract

As games become more popular, procedures which can support the analysis and understanding of players’ behaviors are necessary for success of commercial games. This paper presents a log-based usability evaluation system to analyze user behavior in a gaming environment. We explore the potential of input log data for automated usability evaluation and visualization of player behavior in a game. We traced the keyboard input value and mouse movement of users using a sequence data mining technique in a gaming environment. And we also constructed 3D body meshes for the behavior analysis using Kinect interface. We visualized the data obtained by tracing and automatically searched repetitive patterns in the game and analyzed them. The result obtained from the analysis can be used for user interface optimization, fun evaluation, and the bot-detection field.

Keywords

Usability evaluation Mouse tracking Log data analysis 

References

  1. 1.
    Arroyo, E., Selker, T., Wei, W.: Usability tool for analysis of web designs using mouse tracks. In: CHI’06 Extended Abstracts on Human Factors in Computing Systems, p. 484 (2004)Google Scholar
  2. 2.
    Atterer, R., Wnuk, M., Schmidt, A.: Knowing the user’s every move—user activity tracking for website usability evaluation and implicit interaction. In: Proceedings of the 15th international conference on World Wide Web (WWW), p. 203 (2006)Google Scholar
  3. 3.
    Mueller, F., Lockerd, A.: Cheese: tracking mouse movement activity on websites, a tool for user modeling. In: CHI’01 Extended Abstracts on Human Factors in Computing Systems, p. 279 (2001)Google Scholar
  4. 4.
    Isbister, K., Schaffer, N.: Game Usability: Advancing the Player Experience. Morgan Kaufman, Menlo Park (2008)Google Scholar
  5. 5.
    Xiao, L., Chen, L., Xiao, J.: A new algorithm for shortest path problem in large-scale graph. Appl Math Inf Sci 6, 657 (2012)MathSciNetGoogle Scholar
  6. 6.
    Woo, J.Y., Choi, H.J., Kim, H.K.: An automatic and proactive identity theft detection model in MMORPGs. Appl Math Inf Sci 6, 291 (2012)Google Scholar
  7. 7.
    Yeung, S., Lui, J., Liu, J., Yan, J.: Detecting cheaters for multiplayer games: theory, design and implementation. In: Proceedings of the Consumer Communications and Networking Conference (CCNC), p. 1178 (2006)Google Scholar
  8. 8.
    Kim, J.H., Gunn, D.V., Schuh, E., Phillips, B.C., Pagulayan, R.J., Wixon, D.: Tracking real-time user experience (TRUE): a comprehensive instrumentation solution for complex systems. In: Proceedings of the 26th annual SIGCHI conference on human factors in computing systems, p. 443 (2008)Google Scholar
  9. 9.
    Pao, H.K., Chen, K.T., Chang, H.C.: Game bot detection via avatar trajectory analysis. IEEE Trans Comput Intell AI Games 2, 162 (2010)CrossRefGoogle Scholar
  10. 10.
    Kang, S.J., Kim, Y.B., Park, T.J., Kim, C.H.: Automatic player behavior analysis system using trajectory data in a massive multiplayer online game. Multimed Tools Appl 58, 1 (2012)CrossRefGoogle Scholar
  11. 11.
    Missura, O., Gartner, T.: Player modeling for intelligent difficulty adjustment. In: Proceedings of the 12th International Conference on Discovery Science, p. 197 (2009)Google Scholar
  12. 12.
    Agrawal, R., Srikant, R.: Mining sequential patterns. In: Proceedings of the Eleventh International Conference on Data Engineering (ICDE), p. 3 (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.School of GamesHongik UniversitySeoulKorea
  2. 2.Department of Computer ScienceKorea UniversitySeoulKorea
  3. 3.Department of Game EngineeringPaichai UniversityDaejeonKorea

Personalised recommendations