{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:36Z","timestamp":1750220196801,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Government of Canada New Frontiers in Research Fund","award":["NFRFE-2020-00880"],"award-info":[{"award-number":["NFRFE-2020-00880"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,5]]},"DOI":"10.1145\/3555858.3555948","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T15:48:39Z","timestamp":1667576919000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The Sincerest Form of Flattery: Large-Scale Analysis of Code Re-Use in Atari 2600 Games"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0352-489X","authenticated-orcid":false,"given":"John","family":"Aycock","sequence":"first","affiliation":[{"name":"University of Calgary, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4328-5600","authenticated-orcid":false,"given":"Shankar","family":"Ganesh","sequence":"additional","affiliation":[{"name":"University of Calgary, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2353-8252","authenticated-orcid":false,"given":"Katie","family":"Biittner","sequence":"additional","affiliation":[{"name":"MacEwan University, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3038-7296","authenticated-orcid":false,"given":"Paul Allen","family":"Newell","sequence":"additional","affiliation":[{"name":"Independent researcher, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0634-7633","authenticated-orcid":false,"given":"Carl","family":"Therrien","sequence":"additional","affiliation":[{"name":"University of Montreal, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"M.\u00a0S. Ackerman and G. Parker. 18 November 1986. Process for Displaying a Plurality of Objects on a Video Screen. United States Patent #4 623 147.  M.\u00a0S. Ackerman and G. Parker. 18 November 1986. Process for Displaying a Plurality of Objects on a Video Screen. United States Patent #4 623 147."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9484.001.0001"},{"volume-title":"Proceedings of the 25th USENIX Security Symposium. 583\u2013600","author":"Andriesse D.","key":"e_1_3_2_1_3_1","unstructured":"D. Andriesse , X. Chen , V. van\u00a0der Veen , A. Slowinska , and H. Bos . 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries . In Proceedings of the 25th USENIX Security Symposium. 583\u2013600 . D. Andriesse, X. Chen, V. van\u00a0der Veen, A. Slowinska, and H. Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In Proceedings of the 25th USENIX Security Symposium. 583\u2013600."},{"key":"e_1_3_2_1_4_1","first-page":"183","article-title":"Inspecting the Foundation of Mystery House","volume":"19","author":"Aycock J.","year":"2019","unstructured":"J. Aycock and K. Biittner . 2019 . Inspecting the Foundation of Mystery House . Journal of Contemporary Archaeology 19 , 2 (2019), 183 \u2013 205 . J. Aycock and K. Biittner. 2019. Inspecting the Foundation of Mystery House. Journal of Contemporary Archaeology 19, 2 (2019), 183\u2013205.","journal-title":"Journal of Contemporary Archaeology"},{"volume-title":"LeGACy Code: Studying How (Amateur) Game Developers Used Graphic Adventure Creator. In 15th International Conference on the Foundations of Digital Games. Article 23","author":"Aycock J.","key":"e_1_3_2_1_5_1","unstructured":"J. Aycock and K. Biittner . 2020 . LeGACy Code: Studying How (Amateur) Game Developers Used Graphic Adventure Creator. In 15th International Conference on the Foundations of Digital Games. Article 23 , 7\u00a0pages. J. Aycock and K. Biittner. 2020. LeGACy Code: Studying How (Amateur) Game Developers Used Graphic Adventure Creator. In 15th International Conference on the Foundations of Digital Games. Article 23, 7\u00a0pages."},{"key":"e_1_3_2_1_6_1","volume-title":"Entombed: An archaeological examination of an Atari 2600 game. The Art, Science, and Engineering of Programming 3, 4(2019), 33\u00a0pages. https:\/\/doi.org\/10.22152\/programming-journal.org\/2019\/3\/4","author":"Aycock J.","year":"2019","unstructured":"J. Aycock and T. Copplestone . 2019 . Entombed: An archaeological examination of an Atari 2600 game. The Art, Science, and Engineering of Programming 3, 4(2019), 33\u00a0pages. https:\/\/doi.org\/10.22152\/programming-journal.org\/2019\/3\/4 10.22152\/programming-journal.org J. Aycock and T. Copplestone. 2019. Entombed: An archaeological examination of an Atari 2600 game. The Art, Science, and Engineering of Programming 3, 4(2019), 33\u00a0pages. https:\/\/doi.org\/10.22152\/programming-journal.org\/2019\/3\/4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/280392"},{"key":"e_1_3_2_1_8_1","unstructured":"L.\u00a0R. Binford. 1973. Interassemblage Variability\u2013 the Mousterian and the \u201cFunctional\u201d Argument. In The Explanation of Culture Change: Models in Prehistory C.\u00a0Renfrew (Ed.). Duckworth 227\u2013254.  L.\u00a0R. Binford. 1973. Interassemblage Variability\u2013 the Mousterian and the \u201cFunctional\u201d Argument. In The Explanation of Culture Change: Models in Prehistory C.\u00a0Renfrew (Ed.). Duckworth 227\u2013254."},{"key":"e_1_3_2_1_9_1","volume-title":"Forty-seven Trips: A Case Study in the Character of Archaeological Formation Processes. In Stone Tools as Cultural Markers: Change, Evolution and Complexity, R.\u00a0V.\u00a0S","author":"Binford R.","year":"1977","unstructured":"L.\u00a0 R. Binford . 1977 . Forty-seven Trips: A Case Study in the Character of Archaeological Formation Processes. In Stone Tools as Cultural Markers: Change, Evolution and Complexity, R.\u00a0V.\u00a0S . Wright (Ed.). Humanities Press , 24\u201336. L.\u00a0R. Binford. 1977. Forty-seven Trips: A Case Study in the Character of Archaeological Formation Processes. In Stone Tools as Cultural Markers: Change, Evolution and Complexity, R.\u00a0V.\u00a0S. Wright (Ed.). Humanities Press, 24\u201336."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1086\/jar.35.3.3629902"},{"volume-title":"Working at Archaeology","author":"Binford R.","key":"e_1_3_2_1_11_1","unstructured":"L.\u00a0 R. Binford . 1983. Working at Archaeology . Academic Press . L.\u00a0R. Binford. 1983. Working at Archaeology. Academic Press."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2307\/280862"},{"key":"e_1_3_2_1_13_1","volume-title":"Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection","author":"Collberg Christian","year":"2010","unstructured":"Christian Collberg and Jasvir Nagra . 2010 . Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection . Addison-Wesley . Christian Collberg and Jasvir Nagra. 2010. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley."},{"key":"e_1_3_2_1_14_1","unstructured":"C.\u00a0C. Colton. 1837. Lacon: or Many Things in Few Words. Longman Orme Brown Green & Longmans.  C.\u00a0C. Colton. 1837. Lacon: or Many Things in Few Words. Longman Orme Brown Green & Longmans."},{"key":"e_1_3_2_1_15_1","unstructured":"Computer Magic Inc.1981. MagiCard Instruction Manual. https:\/\/atariage.com\/software_page.php?SoftwareLabelID=281. Accessed 27 March 2022.  Computer Magic Inc.1981. MagiCard Instruction Manual. https:\/\/atariage.com\/software_page.php?SoftwareLabelID=281. Accessed 27 March 2022."},{"key":"e_1_3_2_1_16_1","first-page":"60","article-title":"Atari Video Computer System: Bring Entertainment Stories Home","volume":"4","author":"Decuir J.","year":"2015","unstructured":"J. Decuir . 2015 . Atari Video Computer System: Bring Entertainment Stories Home . IEEE Consumer Electronics Magazine 4 , 3 (2015), 60 \u2013 66 . J. Decuir. 2015. Atari Video Computer System: Bring Entertainment Stories Home. IEEE Consumer Electronics Magazine 4, 3 (2015), 60\u201366.","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"e_1_3_2_1_17_1","first-page":"29","article-title":"Archaeogaming, ethics, and participatory standards","volume":"16","author":"Dennis M.","year":"2016","unstructured":"L.\u00a0 M. Dennis . 2016 . Archaeogaming, ethics, and participatory standards . SAA Archaeological Record 16 , 5 (2016), 29 \u2013 33 . L.\u00a0M. Dennis. 2016. Archaeogaming, ethics, and participatory standards. SAA Archaeological Record 16, 5 (2016), 29\u201333.","journal-title":"SAA Archaeological Record"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1951"},{"key":"e_1_3_2_1_19_1","volume-title":"Replay: The History of Video Games. Yellow Ant.","author":"Donovan T.","year":"2010","unstructured":"T. Donovan . 2010 . Replay: The History of Video Games. Yellow Ant. T. Donovan. 2010. Replay: The History of Video Games. Yellow Ant."},{"volume-title":"BinClone: Detecting Code Clones in Malware. In 8th International Conference on Software Security and Reliability. 78\u201387","author":"Farhadi R.","key":"e_1_3_2_1_20_1","unstructured":"M.\u00a0 R. Farhadi , B.\u00a0C.\u00a0 M. Fung , P. Charland , and M. Debbabi . 2014 . BinClone: Detecting Code Clones in Malware. In 8th International Conference on Software Security and Reliability. 78\u201387 . M.\u00a0R. Farhadi, B.\u00a0C.\u00a0M. Fung, P. Charland, and M. Debbabi. 2014. BinClone: Detecting Code Clones in Malware. In 8th International Conference on Software Security and Reliability. 78\u201387."},{"volume-title":"R.\u00a0Torrence (Ed.)","author":"Gero M.","key":"e_1_3_2_1_21_1","unstructured":"J.\u00a0 M. Gero . 1989. Assessing Social Information in Material Objects: How Well Do Lithics Measure Up?In Time, Energy and Stone Tools , R.\u00a0Torrence (Ed.) . Cambridge University Press , 92\u2013105. J.\u00a0M. Gero. 1989. Assessing Social Information in Material Objects: How Well Do Lithics Measure Up?In Time, Energy and Stone Tools, R.\u00a0Torrence (Ed.). Cambridge University Press, 92\u2013105."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/282430"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/23.3.223"},{"volume-title":"IEEE 25th International Conference on Program Comprehension. 88\u201398","author":"Hu Y.","key":"e_1_3_2_1_24_1","unstructured":"Y. Hu , Y. Zhang , J. Li , and D. Gu . 2017. Binary Code Clone Detection across Architectures and Compiling Configurations . In IEEE 25th International Conference on Program Comprehension. 88\u201398 . Y. Hu, Y. Zhang, J. Li, and D. Gu. 2017. Binary Code Clone Detection across Architectures and Compiling Configurations. In IEEE 25th International Conference on Program Comprehension. 88\u201398."},{"key":"e_1_3_2_1_25_1","unstructured":"S. Hugg. 2016. Making Games for the Atari 2600. CreateSpace.  S. Hugg. 2016. Making Games for the Atari 2600. CreateSpace."},{"key":"e_1_3_2_1_26_1","unstructured":"[\n  26\n  ]  G. Kitchen\u00a0(@kitchengarry).15 December 2021. Tweet. https:\/\/twitter.com\/kitchengarry\/status\/1471158746302713860?s=20&t=vJgYcAH4GGoSimgcv2owBQ  [26] G. Kitchen\u00a0(@kitchengarry).15 December 2021. Tweet. https:\/\/twitter.com\/kitchengarry\/status\/1471158746302713860?s=20&t=vJgYcAH4GGoSimgcv2owBQ"},{"key":"e_1_3_2_1_27_1","unstructured":"T. Lapetino. 2016. Art of Atari. Dynamite Entertainment.  T. Lapetino. 2016. Art of Atari. Dynamite Entertainment."},{"key":"e_1_3_2_1_28_1","volume-title":"Adventure: The Atari 2600 at the Dawn of Console Gaming. Ziff Davis.","author":"Lendino J.","year":"2018","unstructured":"J. Lendino . 2018 . Adventure: The Atari 2600 at the Dawn of Console Gaming. Ziff Davis. J. Lendino. 2018. Adventure: The Atari 2600 at the Dawn of Console Gaming. Ziff Davis."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838101"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2655046"},{"volume-title":"Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms. 319\u2013327","author":"Manber U.","key":"e_1_3_2_1_31_1","unstructured":"U. Manber and G. Myers . 1990. Suffix Arrays: A New Method for On-Line String Searches . In Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms. 319\u2013327 . U. Manber and G. Myers. 1990. Suffix Arrays: A New Method for On-Line String Searches. In Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms. 319\u2013327."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"A.\u00a0L. McDivitt. 2020. Hot Tubs and Pac-Man: Gender and the Early Video Game Industry in the United States (1950s\u20131980s). De Gruyter Oldenbourg.  A.\u00a0L. McDivitt. 2020. Hot Tubs and Pac-Man: Gender and the Early Video Game Industry in the United States (1950s\u20131980s). De Gruyter Oldenbourg.","DOI":"10.1515\/9783110668575"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7588.001.0001"},{"volume-title":"Archaeological Method and Theory.","author":"Nelson C.","key":"e_1_3_2_1_34_1","unstructured":"M.\u00a0 C. Nelson . 1991. The Study of Technological Organization . In Archaeological Method and Theory. Vol. 3 , M.\u00a0B. Schiffer (Ed.). Academic Press , 57\u2013100. M.\u00a0C. Nelson. 1991. The Study of Technological Organization. In Archaeological Method and Theory. Vol. 3, M.\u00a0B. Schiffer (Ed.). Academic Press, 57\u2013100."},{"key":"#cr-split#-e_1_3_2_1_35_1.1","doi-asserted-by":"crossref","unstructured":"P.\u00a0A. Newell J. Aycock and K.\u00a0M. Biittner. 2022. Still Entombed After All These Years: The continuing twists and turns of a maze game. Internet Archaeology 59(2022). https:\/\/doi.org\/10.11141\/ia.59.3 10.11141\/ia.59.3","DOI":"10.11141\/ia.59.3"},{"key":"#cr-split#-e_1_3_2_1_35_1.2","doi-asserted-by":"crossref","unstructured":"P.\u00a0A. Newell J. Aycock and K.\u00a0M. Biittner. 2022. Still Entombed After All These Years: The continuing twists and turns of a maze game. Internet Archaeology 59(2022). https:\/\/doi.org\/10.11141\/ia.59.3","DOI":"10.11141\/ia.59.3"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/10021.001.0001"},{"volume-title":"Alternative Approaches to Lithic Analysis, D.\u00a0O. Henry and G.\u00a0H","author":"Odell H.","key":"e_1_3_2_1_37_1","unstructured":"G.\u00a0 H. Odell . 1989. Summary of Discussions . In Alternative Approaches to Lithic Analysis, D.\u00a0O. Henry and G.\u00a0H . Odell (Eds.). American Anthropological Association . G.\u00a0H. Odell. 1989. Summary of Discussions. In Alternative Approaches to Lithic Analysis, D.\u00a0O. Henry and G.\u00a0H. Odell (Eds.). American Anthropological Association."},{"volume-title":"Expedient Core Technology and Sedentism","author":"Parry J.","key":"e_1_3_2_1_38_1","unstructured":"W.\u00a0 J. Parry and R.\u00a0 L. Kelly . 1987. Expedient Core Technology and Sedentism . In The Organization of Core Technology, J .\u00a0K. Johnson and C.\u00a0A. Morrow (Eds.). Westview Press , 285\u2013304. W.\u00a0J. Parry and R.\u00a0L. Kelly. 1987. Expedient Core Technology and Sedentism. In The Organization of Core Technology, J.\u00a0K. Johnson and C.\u00a0A. Morrow (Eds.). Westview Press, 285\u2013304."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1558\/jca.v2i1.27108"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvw04bb5"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/15554120211005236"},{"volume-title":"Proceedings of the 18th International Symposium on Software Testing and Analysis. 117\u2013127","author":"S\u00e6bj\u00f8rnsen A.","key":"e_1_3_2_1_42_1","unstructured":"A. S\u00e6bj\u00f8rnsen , J. Willcock , T. Panas , D. Quinlan , and Z. Su . 2009. Detecting Code Clones in Binary Executables . In Proceedings of the 18th International Symposium on Software Testing and Analysis. 117\u2013127 . A. S\u00e6bj\u00f8rnsen, J. Willcock, T. Panas, D. Quinlan, and Z. Su. 2009. Detecting Code Clones in Binary Executables. In Proceedings of the 18th International Symposium on Software Testing and Analysis. 117\u2013127."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"H. Sajnani V. Saini C.\u00a0K. Roy and C. Lopes. 2021. SourcererCC: Scalable and Accurate Clone Detection. In Code Clone Analysis: Research Tools and Practices K.\u00a0Inoue and C.\u00a0K. Roy (Eds.). Springer 51\u201362.  H. Sajnani V. Saini C.\u00a0K. Roy and C. Lopes. 2021. SourcererCC: Scalable and Accurate Clone Detection. In Code Clone Analysis: Research Tools and Practices K.\u00a0Inoue and C.\u00a0K. Roy (Eds.). Springer 51\u201362.","DOI":"10.1007\/978-981-16-1927-4_4"},{"key":"e_1_3_2_1_44_1","unstructured":"San Jose Micro Technology. 1982. Atari Video Computer System Programming Manual (Revision C). Gerald Lawson papers Strong National Museum of Play.  San Jose Micro Technology. 1982. Atari Video Computer System Programming Manual (Revision C). Gerald Lawson papers Strong National Museum of Play."},{"key":"e_1_3_2_1_45_1","volume-title":"Game Engine Black Book: Wolfenstein 3D","author":"Sanglard F.","unstructured":"F. Sanglard . 2018. Game Engine Black Book: Wolfenstein 3D ( 2 nd ed.). Independently published. F. Sanglard. 2018. Game Engine Black Book: Wolfenstein 3D(2nd ed.). Independently published.","edition":"2"},{"key":"e_1_3_2_1_46_1","unstructured":"M.\u00a0B. Schiffer. 1976. Behavioural Archaeology. Academic Press.  M.\u00a0B. Schiffer. 1976. Behavioural Archaeology. Academic Press."},{"volume-title":"Waste Not","author":"Schiffer B.","key":"e_1_3_2_1_47_1","unstructured":"M.\u00a0 B. Schiffer , T.\u00a0 E. Downing , and M. McCarthy . 1981. Waste Not , Want Not : An Ethnoarchaeological Study of Reuse in Tucson, Arizona. In Modern Material Culture: The Archaeology of Us, R.\u00a0A. Gould and M.\u00a0B. Schiffer (Eds.). Academic Press , 67\u201386. M.\u00a0B. Schiffer, T.\u00a0E. Downing, and M. McCarthy. 1981. Waste Not, Want Not: An Ethnoarchaeological Study of Reuse in Tucson, Arizona. In Modern Material Culture: The Archaeology of Us, R.\u00a0A. Gould and M.\u00a0B. Schiffer (Eds.). Academic Press, 67\u201386."},{"key":"e_1_3_2_1_48_1","unstructured":"C. Shaw. 10-Feb-83. River Raid source code printout. Carol Shaw papers Strong National Museum of Play.  C. Shaw. 10-Feb-83. River Raid source code printout. Carol Shaw papers Strong National Museum of Play."},{"key":"e_1_3_2_1_49_1","unstructured":"C. Shaw. 13-Dec-78. Polo source code printout. Carol Shaw papers Strong National Museum of Play.  C. Shaw. 13-Dec-78. Polo source code printout. Carol Shaw papers Strong National Museum of Play."},{"key":"e_1_3_2_1_50_1","unstructured":"C. Shaw. 15-Jul-80. Super Breakout source code printout. Carol Shaw papers Strong National Museum of Play.  C. Shaw. 15-Jul-80. Super Breakout source code printout. Carol Shaw papers Strong National Museum of Play."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1086\/jar.42.1.3630378"},{"key":"e_1_3_2_1_52_1","first-page":"1971","article-title":"They Create Worlds","author":"Smith A.","year":"2020","unstructured":"A. Smith . 2020 . They Create Worlds : The Story of the People and Companies That Shaped the Video Game Industry , Volume I : 1971 \u2013 1982 . CRC Press. A. Smith. 2020. They Create Worlds: The Story of the People and Companies That Shaped the Video Game Industry, Volume I: 1971\u20131982. CRC Press.","journal-title":"The Story of the People and Companies That Shaped the Video Game Industry"},{"volume-title":"Return to the Interactive Past: The Interplay of Video Games and Histories, C.\u00a0E. Ariese, K.\u00a0H.\u00a0J. Boom, B.\u00a0van\u00a0den Hout, A.\u00a0A.\u00a0A. Mol, and A.\u00a0Politopoulos (Eds.)","author":"Smith\u00a0Nicholls F.","key":"e_1_3_2_1_53_1","unstructured":"F. Smith\u00a0Nicholls . 2021. Fork in the Road: Consuming and Producing Video Game Cartographies . In Return to the Interactive Past: The Interplay of Video Games and Histories, C.\u00a0E. Ariese, K.\u00a0H.\u00a0J. Boom, B.\u00a0van\u00a0den Hout, A.\u00a0A.\u00a0A. Mol, and A.\u00a0Politopoulos (Eds.) . Sidestone Press , 117\u2013133. F. Smith\u00a0Nicholls. 2021. Fork in the Road: Consuming and Producing Video Game Cartographies. In Return to the Interactive Past: The Interplay of Video Games and Histories, C.\u00a0E. Ariese, K.\u00a0H.\u00a0J. Boom, B.\u00a0van\u00a0den Hout, A.\u00a0A.\u00a0A. Mol, and A.\u00a0Politopoulos (Eds.). Sidestone Press, 117\u2013133."},{"volume-title":"The Media Snatcher: PC\/CORE\/TURBO\/ENGINE\/GRAFX\/16\/CDROM2\/SUPER\/DUO\/ARCADE\/RX","author":"Therrien C.","key":"e_1_3_2_1_54_1","unstructured":"C. Therrien . 2019. The Media Snatcher: PC\/CORE\/TURBO\/ENGINE\/GRAFX\/16\/CDROM2\/SUPER\/DUO\/ARCADE\/RX . MIT Press . C. Therrien. 2019. The Media Snatcher: PC\/CORE\/TURBO\/ENGINE\/GRAFX\/16\/CDROM2\/SUPER\/DUO\/ARCADE\/RX. MIT Press."},{"volume-title":"Hunter-Gatherer Economy in Prehistory: A European Perspective, G.\u00a0Bailey (Ed.)","author":"Torrence R.","key":"e_1_3_2_1_55_1","unstructured":"R. Torrence . 1983. Time Budgeting and Hunter-Gatherer Technology . In Hunter-Gatherer Economy in Prehistory: A European Perspective, G.\u00a0Bailey (Ed.) . Cambridge University Press , 11\u201322. R. Torrence. 1983. Time Budgeting and Hunter-Gatherer Technology. In Hunter-Gatherer Economy in Prehistory: A European Perspective, G.\u00a0Bailey (Ed.). Cambridge University Press, 11\u201322."},{"key":"e_1_3_2_1_56_1","unstructured":"L. Wiest. 2016. Reverse engineering Star Raiders. PoC||GTFO 0x13(2016) 5\u201320.  L. Wiest. 2016. Reverse engineering Star Raiders. PoC||GTFO 0x13(2016) 5\u201320."}],"event":{"name":"FDG22: 17th International Conference on the Foundations of Digital Games","acronym":"FDG22","location":"Athens Greece"},"container-title":["Proceedings of the 17th International Conference on the Foundations of Digital Games"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555858.3555948","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555858.3555948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:40Z","timestamp":1750186960000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555858.3555948"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,5]]},"references-count":57,"alternative-id":["10.1145\/3555858.3555948","10.1145\/3555858"],"URL":"https:\/\/doi.org\/10.1145\/3555858.3555948","relation":{},"subject":[],"published":{"date-parts":[[2022,9,5]]},"assertion":[{"value":"2022-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}