SlideShare a Scribd company logo
Havok Middleware를 활용한
Dynamic 하고 Realistic 한 게임 개발

Field Application Engineer 강정훈

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Who is presenting?





Havok Korea
Field Application Engineer
강정훈 과장
Alex.kang@havok.com

Game Client
Development

2002

B2B Solution
Development

Platform Test
Automation

2008

2010

Field Application Engineer

2012.10 ~

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok History
1999

2004

2006

2008

2009

2010

700개 이상의 출시 타이틀 보유
Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.

2011
하복 제품군
3D 게임 엔진 및
개발 도구
Havok Vision Engine
3D 게임 엔진

Havok AI
동적 길 찾기

시뮬레이션 런타임 및
개발 도구

캐릭터 애니메이션
개발 도구

Havok Physics

Havok Animation Studio

물리 시뮬레이션

애니메이션 런타임 & 툴

Havok Destruction

Havok Cloth

실시간 파괴 효과

Havok Script
LUA 스크립팅

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.

의류 시뮬레이션
Why Havok Physics?

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
동적인 게임 제작을 위한 핵심 기술들

최적화된 물리를 기반으로 다양한 영역으로 확장

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Animation Studio

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Animation Studio

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
환경과의 인터랙션
Locomotion and Docking Video

[Climbing]

[Take Cover Docking]

[Vaulting]
Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Parameter Driven Animation
Parametric Generator Video

Speed = 2.5,
Angle = 50

Speed = 7.5,
Angle = 20

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Animation Blend

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Inverse Kinematics

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Jiggle Bone

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Inverse Kinematics

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Ragdoll 과 Animation 의 상호작용

Stagger Ragdoll Attachment

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Case Study

※ Case Study를 통해 설명드릴 내용들은 일반적인 Havok 제품의 활용 방법으로

게임에서의 실제 구현 방식과 다를 수 있습니다.
Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
TM

Havok Cloth

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Cloth Simulation?

SIGGRAPH2007, “Efficient Simulation of Inextensible Cloth”
Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Cloth Simulation?

SIGGRAPH2007, “Efficient Simulation of Inextensible Cloth”

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Cloth Development focus

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Core Benefits – Cloth 디자인 도구

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Cloth

Tekken Tag Tournament 2

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Quick Walkthrough Example
Simple Cloth Flag
Simple Thick Cloth
Trouser Cloth
Vertex Painting

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Various Materials
Materials

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Hair Simulation
single layer ponytail

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Level Of Detail
Flag Demo

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Character Clothing
Character clothing

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Showcase Demo - Troll
Troll Demo

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Case Study

※ Case Study 를 통해 설명드릴 내용들은 일반적인 Havok 제품의 활용 방법으로
게임에서의 실제 구현 방식과 (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok™ Confidential. © Copyright 2013 Havok.com 다를 수 있습니다
Havok Destruction

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Destruction?

[Just Cause 2 (see 1m 20s)]
Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Destruction - Use in Games

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Destruction Use Cases
 Breakable Objects

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Destruction Use Cases

 Deformation

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Destruction Use Cases

 Buildings

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Havok Destruction Use Cases

Structures
Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
“Show Case” demos

[Interior Room]

[Bridge Low]
[Bridge Deep]

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
Best Practice
Using All Havok middlewares

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
project BlackSheep

Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
TM

Thank you
Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.

More Related Content

Similar to [KGC2013] dynamic and realistic game development using Havok Middlewares

Real-time Data Updates for Neo4j Using GraphQL Subscriptions
Real-time Data Updates for Neo4j Using GraphQL SubscriptionsReal-time Data Updates for Neo4j Using GraphQL Subscriptions
Real-time Data Updates for Neo4j Using GraphQL Subscriptions
Neo4j
 
Google ARが提供する WebAR 101
Google ARが提供する WebAR 101Google ARが提供する WebAR 101
Google ARが提供する WebAR 101
Hirokazu Egashira
 
Java è il linguaggio dell’IoT - Weaver
Java è il linguaggio dell’IoT - WeaverJava è il linguaggio dell’IoT - Weaver
Java è il linguaggio dell’IoT - Weaver
Codemotion
 
Groovy for Java Developers
Groovy for Java DevelopersGroovy for Java Developers
Groovy for Java Developers
Peter Ledbrook
 
Building an HTML5 Video Player
Building an HTML5 Video PlayerBuilding an HTML5 Video Player
Building an HTML5 Video Player
Brightcove
 
Coherence 12.1.2 Live Events
Coherence 12.1.2 Live EventsCoherence 12.1.2 Live Events
Coherence 12.1.2 Live Events
harvraja
 
Patterns and antipatterns in Docker image lifecycle as was presented at Oracl...
Patterns and antipatterns in Docker image lifecycle as was presented at Oracl...Patterns and antipatterns in Docker image lifecycle as was presented at Oracl...
Patterns and antipatterns in Docker image lifecycle as was presented at Oracl...
Baruch Sadogursky
 
Heroku + Jeweler & Gemcutter
Heroku + Jeweler & GemcutterHeroku + Jeweler & Gemcutter
Heroku + Jeweler & Gemcutter
Ariejan de Vroom
 
OAuth and OpenID Connect for Microservices
OAuth and OpenID Connect for MicroservicesOAuth and OpenID Connect for Microservices
OAuth and OpenID Connect for Microservices
Twobo Technologies
 
Keeping hackers out release to public
Keeping hackers out   release to publicKeeping hackers out   release to public
Keeping hackers out release to public
Bas Lijten
 
Technology Trends 2010
Technology Trends 2010Technology Trends 2010
Technology Trends 2010
Henry Jacob
 
Best Practices In Implementing Container Image Promotion Pipelines
Best Practices In Implementing Container Image Promotion PipelinesBest Practices In Implementing Container Image Promotion Pipelines
Best Practices In Implementing Container Image Promotion Pipelines
All Things Open
 
Java Debuggers: A Peek Under the Hood [JavaOne 2016 CON1503]
Java Debuggers: A Peek Under the Hood [JavaOne 2016 CON1503]Java Debuggers: A Peek Under the Hood [JavaOne 2016 CON1503]
Java Debuggers: A Peek Under the Hood [JavaOne 2016 CON1503]
David Buck
 
Patterns and antipatterns in Docker image lifecycle as was presented at Globa...
Patterns and antipatterns in Docker image lifecycle as was presented at Globa...Patterns and antipatterns in Docker image lifecycle as was presented at Globa...
Patterns and antipatterns in Docker image lifecycle as was presented at Globa...
Baruch Sadogursky
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...
ForgeRock
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijacking
Комсс Файквэе
 
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
Nordic APIs
 
Sitecore loves containers
Sitecore loves containersSitecore loves containers
Sitecore loves containers
Bart Plasmeijer
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024
Anthony Dahanne
 

Similar to [KGC2013] dynamic and realistic game development using Havok Middlewares (19)

Real-time Data Updates for Neo4j Using GraphQL Subscriptions
Real-time Data Updates for Neo4j Using GraphQL SubscriptionsReal-time Data Updates for Neo4j Using GraphQL Subscriptions
Real-time Data Updates for Neo4j Using GraphQL Subscriptions
 
Google ARが提供する WebAR 101
Google ARが提供する WebAR 101Google ARが提供する WebAR 101
Google ARが提供する WebAR 101
 
Java è il linguaggio dell’IoT - Weaver
Java è il linguaggio dell’IoT - WeaverJava è il linguaggio dell’IoT - Weaver
Java è il linguaggio dell’IoT - Weaver
 
Groovy for Java Developers
Groovy for Java DevelopersGroovy for Java Developers
Groovy for Java Developers
 
Building an HTML5 Video Player
Building an HTML5 Video PlayerBuilding an HTML5 Video Player
Building an HTML5 Video Player
 
Coherence 12.1.2 Live Events
Coherence 12.1.2 Live EventsCoherence 12.1.2 Live Events
Coherence 12.1.2 Live Events
 
Patterns and antipatterns in Docker image lifecycle as was presented at Oracl...
Patterns and antipatterns in Docker image lifecycle as was presented at Oracl...Patterns and antipatterns in Docker image lifecycle as was presented at Oracl...
Patterns and antipatterns in Docker image lifecycle as was presented at Oracl...
 
Heroku + Jeweler & Gemcutter
Heroku + Jeweler & GemcutterHeroku + Jeweler & Gemcutter
Heroku + Jeweler & Gemcutter
 
OAuth and OpenID Connect for Microservices
OAuth and OpenID Connect for MicroservicesOAuth and OpenID Connect for Microservices
OAuth and OpenID Connect for Microservices
 
Keeping hackers out release to public
Keeping hackers out   release to publicKeeping hackers out   release to public
Keeping hackers out release to public
 
Technology Trends 2010
Technology Trends 2010Technology Trends 2010
Technology Trends 2010
 
Best Practices In Implementing Container Image Promotion Pipelines
Best Practices In Implementing Container Image Promotion PipelinesBest Practices In Implementing Container Image Promotion Pipelines
Best Practices In Implementing Container Image Promotion Pipelines
 
Java Debuggers: A Peek Under the Hood [JavaOne 2016 CON1503]
Java Debuggers: A Peek Under the Hood [JavaOne 2016 CON1503]Java Debuggers: A Peek Under the Hood [JavaOne 2016 CON1503]
Java Debuggers: A Peek Under the Hood [JavaOne 2016 CON1503]
 
Patterns and antipatterns in Docker image lifecycle as was presented at Globa...
Patterns and antipatterns in Docker image lifecycle as was presented at Globa...Patterns and antipatterns in Docker image lifecycle as was presented at Globa...
Patterns and antipatterns in Docker image lifecycle as was presented at Globa...
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijacking
 
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
 
Sitecore loves containers
Sitecore loves containersSitecore loves containers
Sitecore loves containers
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

[KGC2013] dynamic and realistic game development using Havok Middlewares

  • 1. Havok Middleware를 활용한 Dynamic 하고 Realistic 한 게임 개발 Field Application Engineer 강정훈 Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 2. Who is presenting?     Havok Korea Field Application Engineer 강정훈 과장 Alex.kang@havok.com Game Client Development 2002 B2B Solution Development Platform Test Automation 2008 2010 Field Application Engineer 2012.10 ~ Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 3. Havok Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 4. Havok History 1999 2004 2006 2008 2009 2010 700개 이상의 출시 타이틀 보유 Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok. 2011
  • 5. 하복 제품군 3D 게임 엔진 및 개발 도구 Havok Vision Engine 3D 게임 엔진 Havok AI 동적 길 찾기 시뮬레이션 런타임 및 개발 도구 캐릭터 애니메이션 개발 도구 Havok Physics Havok Animation Studio 물리 시뮬레이션 애니메이션 런타임 & 툴 Havok Destruction Havok Cloth 실시간 파괴 효과 Havok Script LUA 스크립팅 Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok. 의류 시뮬레이션
  • 6. Why Havok Physics? Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 7. 동적인 게임 제작을 위한 핵심 기술들 최적화된 물리를 기반으로 다양한 영역으로 확장 Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 8. Havok Animation Studio Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 9. Havok Animation Studio Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 10. 환경과의 인터랙션 Locomotion and Docking Video [Climbing] [Take Cover Docking] [Vaulting] Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 11. Parameter Driven Animation Parametric Generator Video Speed = 2.5, Angle = 50 Speed = 7.5, Angle = 20 Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 12. Animation Blend Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 13. Inverse Kinematics Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 14. Jiggle Bone Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 15. Inverse Kinematics Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 16. Ragdoll 과 Animation 의 상호작용 Stagger Ragdoll Attachment Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 17. Case Study ※ Case Study를 통해 설명드릴 내용들은 일반적인 Havok 제품의 활용 방법으로 게임에서의 실제 구현 방식과 다를 수 있습니다. Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 18. TM Havok Cloth Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 19. Cloth Simulation? SIGGRAPH2007, “Efficient Simulation of Inextensible Cloth” Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 20. Cloth Simulation? SIGGRAPH2007, “Efficient Simulation of Inextensible Cloth” Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 21. Havok Cloth Development focus Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 22. Core Benefits – Cloth 디자인 도구 Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 23. Havok Cloth Tekken Tag Tournament 2 Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 24. Quick Walkthrough Example Simple Cloth Flag Simple Thick Cloth Trouser Cloth Vertex Painting Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 25. Various Materials Materials Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 26. Hair Simulation single layer ponytail Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 27. Level Of Detail Flag Demo Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 28. Character Clothing Character clothing Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 29. Showcase Demo - Troll Troll Demo Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 30. Case Study ※ Case Study 를 통해 설명드릴 내용들은 일반적인 Havok 제품의 활용 방법으로 게임에서의 실제 구현 방식과 (and its licensors). All Rights Reserved. Confidential Information of Havok. Havok™ Confidential. © Copyright 2013 Havok.com 다를 수 있습니다
  • 31. Havok Destruction Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 32. Havok Destruction? [Just Cause 2 (see 1m 20s)] Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 33. Havok Destruction - Use in Games Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 34. Havok Destruction Use Cases  Breakable Objects Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 35. Havok Destruction Use Cases  Deformation Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 36. Havok Destruction Use Cases  Buildings Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 37. Havok Destruction Use Cases Structures Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 38. “Show Case” demos [Interior Room] [Bridge Low] [Bridge Deep] Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 39. Best Practice Using All Havok middlewares Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 40. project BlackSheep Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.
  • 41. TM Thank you Havok™ Confidential. © Copyright 2013 Havok.com (and its licensors). All Rights Reserved. Confidential Information of Havok.