铁血丹心

 找回密码
 我要成为铁血侠客
搜索
查看: 3274|回复: 18

[攻略秘籍] 金前的关于阿丑的一个大bug

   关闭 [复制链接]
发表于 2010-8-27 08:12 | 显示全部楼层 |阅读模式

马上注册,结交更多侠友!

您需要 登录 才可以下载或查看,没有账号?我要成为铁血侠客

x
就是点开“技”窗口看阿丑的第三级技能时说战斗时偷得对手随身物品。阿贤的技能里却明确的说了记录武功的概率,可是阿丑这里却没有注明。实际上号称的神偷不是100%成功的。作为游戏开发者,你不可能要求所有的玩家都把论坛攻略一个个过一遍的。即便是很多攻略也并没有注明阿丑偷东西有概率失败这一点。加几个字说明一下不是什么费劲的事情吧?

我今天偷任我行撕天裂地时才发现,原来有可能偷不到。我不停提盘,打了5遍才偷到。满以为凑齐了所谓的修罗套装,却找不到镇狱。看来当时打慕容博并没有偷盗成功,只是当时不知道……
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-27 09:00 | 显示全部楼层
打药王庄升级的时候我就发现了

[发帖际遇]: raybear跟韦小宝赌钱,被韦小宝出千骗去银两26两。
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-27 09:01 | 显示全部楼层
是的,有时候无奈的S/L,最重要的是,刚开始玩哪知道谁身上有什么?打完后就完事了……

[发帖际遇]: 破鱼在高昌迷宫中迷路,花费银两17向李文秀问路。
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-27 10:28 | 显示全部楼层
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-27 11:52 | 显示全部楼层
这不是bug,本来就是这样设计的,不喜欢的话,自己修改吧

[发帖际遇]: 天下有敌协助郭靖守护襄阳多年,得郭靖称赞,增加声望4。
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-27 11:59 | 显示全部楼层
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
 楼主| 发表于 2010-8-27 12:37 | 显示全部楼层
这怎么就不是bug?

这不是bug,本来就是这样设计的,不喜欢的话,自己修改吧
天下有敌 发表于 2010-8-27 11:52
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-27 12:41 | 显示全部楼层
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
头像被屏蔽
发表于 2010-8-27 12:50 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-27 12:55 | 显示全部楼层
100%又没说一次就成功,偷到了不就好了
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-27 18:51 | 显示全部楼层
象偷东西和合成物品这些的成功率都应该设成100%,不然纯粹只是浪费玩家SL的时间,对提高游戏的意外性毫无意义。因为95%以上的玩家没偷到重要物品或合成失败都会取档。
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-27 19:22 | 显示全部楼层
不是关键武功就无所谓了
衣服什么的随便敲敲特效了
修罗套我就一直没及成过
总是忘东忘西
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
 楼主| 发表于 2010-8-27 23:38 | 显示全部楼层
看来你我对bug的理解有差距。对于我来说,编程时没有注意到的细节导致产生了没有预期到的结果应该算做程序的bug。阿丑的技能显示界面没有提及概率,这在正常情况下玩家都不会想到概率问题,就好比说你家的电饭锅可以煮饭,恐怕没有几个人会理解为你家电饭锅50%概率下可以煮饭。所以这个地方作者的确没有写清楚。按照一般的定义,这就是一个bug。详见Wikipedia的定义:

http://en.wikipedia.org/wiki/Software_bug

Software bug
From Wikipedia, the free encyclopedia
To report a MediaWiki error on Wikipedia, see Wikipedia:Bug reports.
        Software Testing portal
A software bug is the common term used to describe an error, flaw, mistake, failure, or fault in a computer program or system that produces an incorrect or unexpected result, or causes it to behave in unintended ways. Most bugs arise from mistakes and errors made by people in either a program's source code or its design, and a few are caused by compilers producing incorrect code. A program that contains a large number of bugs, and/or bugs that seriously interfere with its functionality, is said to be buggy. Reports detailing bugs in a program are commonly known as bug reports, fault reports, problem reports, trouble reports, change requests, and so forth.
Contents [hide]
1 Effects
2 Etymology
3 Prevention
4 Debugging
5 Bug management
6 Security vulnerabilities
7 Common types of computer bugs
7.1 Arithmetic bugs
7.2 Logic bugs
7.3 Syntax bugs
7.4 Resource bugs
7.5 Multi-threading programming bugs
7.6 Teamworking bugs
8 Bugs in popular culture
9 See also
10 Notes
11 External links
[edit]Effects

Main article: List of software bugs
Bugs trigger Type I and type II errors that can in turn have a wide variety of ripple effects, with varying levels of inconvenience to the user of the program. Some bugs have only a subtle effect on the program's functionality, and may thus lie undetected for a long time. More serious bugs may cause the program to crash or freeze leading to a denial of service. Others qualify as security bugs and might for example enable a malicious user to bypass access controls in order to obtain unauthorized privileges.
The results of bugs may be extremely serious. Bugs in the code controlling the Therac-25 radiation therapy machine were directly responsible for some patient deaths in the 1980s. In 1996, the European Space Agency's US$1 billion prototype Ariane 5 rocket was destroyed less than a minute after launch, due to a bug in the on-board guidance computer program. In June 1994, a Royal Air Force Chinook crashed into the Mull of Kintyre, killing 29. This was initially dismissed as pilot error, but an investigation by Computer Weekly uncovered sufficient evidence to convince a House of Lords inquiry that it may have been caused by a software bug in the aircraft's engine control computer. [1]
In 2002, a study commissioned by the US Department of Commerce' National Institute of Standards and Technology concluded that software bugs, or errors, are so prevalent and so detrimental that they cost the US economy an estimated $59 billion annually, or about 0.6 percent of the gross domestic product.[2]
[edit]Etymology

The concept that software might contain errors dates back to 1843 in Ada Byron's notes on the analytical engine in which she speaks of the difficulty of preparing program 'cards' for Charles Babbage's Analytical engine:
“        ...an analyzing process must equally have been performed in order to furnish the Analytical Engine with the necessary operative data; and that herein may also lie a possible source of error. Granted that the actual mechanism is unerring in its processes, the cards may give it wrong orders.        ”
Use of the term "bug" to describe inexplicable defects has been a part of engineering jargon for many decades and predates computers and computer software; it may have originally been used in hardware engineering to describe mechanical malfunctions. For instance, Thomas Edison wrote the following words in a letter to an associate in 1878:
“        It has been just so in all of my inventions. The first step is an intuition, and comes with a burst, then difficulties arise—this thing gives out and [it is] then that 'Bugs' — as such little faults and difficulties are called—show themselves and months of intense watching, study and labor are requisite before commercial success or failure is certainly reached.        ”
[3]
Problems with radar electronics during World War II were referred to as bugs (or glitches) and there is additional evidence that the usage dates back much earlier. Baffle Ball, the first mechanical pinball game, was advertised as being "free of bugs" in 1931.[4]


Photo of what is possibly the first real bug found in a computer.
The invention of the term is often erroneously attributed to Grace Hopper, who publicized the cause of a malfunction in an early electromechanical computer.[5] A typical version of the story is given by this quote:[6]
“        In 1946, when Hopper was released from active duty, she joined the Harvard Faculty at the Computation Laboratory where she continued her work on the Mark II and Mark III. Operators traced an error in the Mark II to a moth trapped in a relay, coining the term bug. This bug was carefully removed and taped to the log book. Stemming from the first bug, today we call errors or glitch's [sic] in a program a bug.        ”
Hopper was not actually the one who found the insect, as she readily acknowledged. The date in the log book was 9 September 1947,[7][8], although sometimes erroneously reported as 1945.[9] The operators who did find it, including William "Bill" Burke, later of the Naval Weapons Laboratory, Dahlgren, Virginia,[10] were familiar with the engineering term and, amused, kept the insect with the notation "First actual case of bug being found." Hopper loved to recount the story.[11] This log book is on display in the Smithsonian National Museum of American History, complete with moth attached.[8]
While it is certain that the Harvard Mark II operators did not coin the term "bug", it has been suggested that they did coin the related term, "debug". Even this is unlikely, since the Oxford English Dictionary entry for "debug" contains a use of "debugging" in the context of air-plane engines in 1945. See: debugging.
[edit]Prevention

Bugs are a consequence of the nature of human factors in the programming task. They arise from oversights or mutual misunderstandings made by a software team during specification, design, coding, data entry and documentation. For example: In creating a relatively simple program to sort a list of words into alphabetical order, one's design might fail to consider what should happen when a word contains a hyphen. Perhaps, when converting the abstract design into the chosen programming language, one might inadvertently create an off-by-one error and fail to sort the last word in the list. Finally, when typing the resulting program into the computer, one might accidentally type a '<' where a '>' was intended, perhaps resulting in the words being sorted into reverse alphabetical order. More complex bugs can arise from unintended interactions between different parts of a computer program. This frequently occurs because computer programs can be complex—millions of lines long in some cases—often having been programmed by many people over a great length of time, so that programmers are unable to mentally track every possible way in which parts can interact. Another category of bug called a race condition comes about either when a process is running in more than one thread or two or more processes run simultaneously, and the exact order of execution of the critical sequences of code have not been properly synchronized.
The software industry has put much effort into finding methods for preventing programmers from inadvertently introducing bugs while writing software.[12][13] These include:
Programming style
While typos in the program code are often caught by the compiler, a bug usually appears when the programmer makes a logic error. Various innovations in programming style and defensive programming are designed to make these bugs less likely, or easier to spot. In some programming languages, so-called typos, especially of symbols or logical/mathematical operators, actually represent logic errors, since the mistyped constructs are accepted by the compiler with a meaning other than that which the programmer intended.
Programming techniques
Bugs often create inconsistencies in the internal data of a running program. Programs can be written to check the consistency of their own internal data while running. If an inconsistency is encountered, the program can immediately halt, so that the bug can be located and fixed. Alternatively, the program can simply inform the user, attempt to correct the inconsistency, and continue running.
Development methodologies
There are several schemes for managing programmer activity, so that fewer bugs are produced. Many of these fall under the discipline of software engineering (which addresses software design issues as well). For example, formal program specifications are used to state the exact behavior of programs, so that design bugs can be eliminated. Unfortunately, formal specifications are impractical or impossible for anything but the shortest programs, because of problems of combinatorial explosion and indeterminacy.
Programming language support
Programming languages often include features which help programmers prevent bugs, such as static type systems, restricted name spaces and modular programming, among others. For example, when a programmer writes (pseudocode) LET REAL_VALUE PI = "THREE AND A BIT", although this may be syntactically correct, the code fails a type check. Depending on the language and implementation, this may be caught by the compiler or at runtime. In addition, many recently-invented languages have deliberately excluded features which can easily lead to bugs, at the expense of making code slower than it need be: the general principle being that, because of Moore's law, computers get faster and software engineers get slower; it is almost always better to write simpler, slower code than "clever", inscrutable code, especially considering that maintenance cost is considerable. For example, the Java programming language does not support pointer arithmetic; implementations of some languages such as Pascal and scripting languages often have runtime bounds checking of arrays, at least in a debugging build.
Code analysis
Tools for code analysis help developers by inspecting the program text beyond the compiler's capabilities to spot potential problems. Although in general the problem of finding all programming errors given a specification is not solvable (see halting problem), these tools exploit the fact that human programmers tend to make the same kinds of mistakes when writing software.
Instrumentation
Tools to monitor the performance of the software as it is running, either specifically to find problems such as bottlenecks or to give assurance as to correct working, may be embedded in the code explicitly (perhaps as simple as a statement saying PRINT "I AM HERE"), or provided as tools. It is often a surprise to find where most of the time is taken by a piece of code, and this removal of assumptions might cause the code to be rewritten.
[edit]Debugging



The typical bug history (GNU Classpath project data). A new bug submitted by the user is unconfirmed. Once it has been reproduced by a developer, it is a confirmed bug. The confirmed bugs are later fixed. Bugs belonging to other categories (unreproducible, will not be fixed, etc) are usually in the minority
Main article: Debugging
Finding and fixing bugs, or "debugging", has always been a major part of computer programming. Maurice Wilkes, an early computing pioneer, described his realization in the late 1940s that much of the rest of his life would be spent finding mistakes in his own programs[14]. As computer programs grow more complex, bugs become more common and difficult to fix. Often programmers spend more time and effort finding and fixing bugs than writing new code. Software testers are professionals whose primary task is to find bugs, or write code to support testing. On some projects, more resources can be spent on testing than in developing the program.
Usually, the most difficult part of debugging is finding the bug in the source code. Once it is found, correcting it is usually relatively easy. Programs known as debuggers exist to help programmers locate bugs by executing code line by line, watching variable values, and other features to observe program behavior. Without a debugger, code can be added so that messages or values can be written to a console (for example with printf in the C programming language) or to a window or log file to trace program execution or show values.
However, even with the aid of a debugger, locating bugs is something of an art. It is not uncommon for a bug in one section of a program to cause failures in a completely different section, thus making it especially difficult to track (for example, an error in a graphics rendering routine causing a file I/O routine to fail), in an apparently unrelated part of the system.
Sometimes, a bug is not an isolated flaw, but represents an error of thinking or planning on the part of the programmer. Such logic errors require a section of the program to be overhauled or rewritten. As a part of Code review, stepping through the code modelling the execution process in one's head or on paper can often find these errors without ever needing to reproduce the bug as such, if it can be shown there is some faulty logic in its implementation.
But more typically, the first step in locating a bug is to reproduce it reliably. Once the bug is reproduced, the programmer can use a debugger or some other tool to monitor the execution of the program in the faulty region, and find the point at which the program went astray.
It is not always easy to reproduce bugs. Some are triggered by inputs to the program which may be difficult for the programmer to re-create. One cause of the Therac-25 radiation machine deaths was a bug (specifically, a race condition) that occurred only when the machine operator very rapidly entered a treatment plan; it took days of practice to become able to do this, so the bug did not manifest in testing or when the manufacturer attempted to duplicate it. Other bugs may disappear when the program is run with a debugger; these are heisenbugs (humorously named after the Heisenberg uncertainty principle.)
Debugging is still a tedious task requiring considerable effort. Since the 1990s, particularly following the Ariane 5 Flight 501 disaster, there has been a renewed interest in the development of effective automated aids to debugging. For instance, methods of static code analysis by abstract interpretation have already made significant achievements, while still remaining much of a work in progress.
As with any creative act, sometimes a flash of inspiration will show a solution, but this is rare and, by definition, cannot be relied on.
There are also classes of bugs that have nothing to do with the code itself. If, for example, one relies on faulty documentation or hardware, the code may be written perfectly properly to what the documentation says, but the bug truly lies in the documentation or hardware, not the code. However, it is common to change the code instead of the other parts of the system, as the cost and time to change it is generally less. Embedded systems frequently have workarounds for hardware bugs, since to make a new version of a ROM is much cheaper than remanufacturing the hardware, especially if they are commodity items.
[edit]Bug management

It is common practice for software to be released with known bugs that are considered non-critical, that is, that do not affect most users' main experience with the product. While software products may, by definition, contain any number of unknown bugs, measurements during testing can provide an estimate of the number of likely bugs remaining; this becomes more reliable the longer a product is tested and developed ("if we had 200 bugs last week, we should have 100 this week"). Most big software projects maintain two lists of "known bugs"— those known to the software team, and those to be told to users. This is not dissimulation, but users are not concerned with the internal workings of the product. The second list informs users about bugs that are not fixed in the current release, or not fixed at all, and a workaround may be offered.
There are various reasons for not fixing bugs:
The developers often don't have time or it is not economical to fix all non-severe bugs.
The bug could be fixed in a new version or patch that is not yet released.
The changes to the code required to fix the bug could be large, expensive, or delay finishing the project.
Even seemingly simple fixes bring the chance of introducing new unknown bugs into the system. At the end of a test/fix cycle some managers may only allow the most critical bugs to be fixed.
Users may be relying on the undocumented, buggy behavior, especially if scripts or macros rely on a behavior; it may introduce a breaking change.
It's "not a bug". A misunderstanding has arisen between expected and provided behavior
Given the above, it is often considered impossible to write completely bug-free software of any real complexity. So bugs are categorized by severity, and low-severity non-critical bugs are tolerated, as they do not affect the proper operation of the system for most users. NASA's SATC managed to reduce the number of errors to fewer than 0.1 per 1000 lines of code (SLOC)[citation needed] but this was not felt to be feasible for any real world projects.
The severity of a bug is not the same as its importance for fixing, and the two should be measured and managed separately. On a Microsoft Windows system a blue screen of death is rather severe, but if it only occurs in extreme circumstances, especially if they are well diagnosed and avoidable, it may be less important to fix than an icon not representing its function well, which though purely aesthetic may confuse thousands of users every single day. This balance, of course, depends on many factors; expert users have different expectations from novices, a niche market is different from a general consumer market, and so on. To better achieve this balance, some software developers use a formalized bug triage process (borrowing the medical term), in which each new bug is assigned a priority based on its severity, frequency, risk, and other predetermined factors.[citation needed]
A school of thought popularized by Eric S. Raymond as Linus's Law says that popular open-source software has more chance of having few or no bugs than other software, because "given enough eyeballs, all bugs are shallow".[15] This assertion has been disputed, however: computer security specialist Elias Levy wrote that "it is easy to hide vulnerabilities in complex, little understood and undocumented source code," because, "even if people are reviewing the code, that doesn't mean they're qualified to do so."[16]
Like any other part of engineering management, bug management must be conducted carefully and intelligently because "what gets measured gets done"[17] and managing purely by bug counts can have unintended consequences. If, for example, developers are rewarded by the number of bugs they fix, they will naturally fix the easiest bugs first— leaving the hardest, and probably most risky or critical, to the last possible moment ("I only have one bug on my list but it says "Make sun rise in West"). If the management ethos is to reward the number of bugs fixed, then some developers may quickly write sloppy code knowing they can fix the bugs later and be rewarded for it, whereas careful, perhaps "slower" developers do not get rewarded for the bugs that were never there.
[edit]Security vulnerabilities

Malicious software may attempt to exploit known vulnerabilities in a system — which may or may not be bugs. Viruses are not bugs in themselves — they are typically programs that are doing precisely what they were designed to do. However, viruses are occasionally referred to as such in the popular press.[citation needed]
[edit]Common types of computer bugs

Conceptual error (code is syntactically correct, but the programmer or designer intended it to do something else)
[edit]Arithmetic bugs
Division by zero
Arithmetic overflow or underflow
Loss of arithmetic precision due to rounding or numerically unstable algorithms
[edit]Logic bugs
Infinite loops and infinite recursion
Off by one error, counting one too many or too few when looping
[edit]Syntax bugs
Use of the wrong operator, such as performing assignment instead of equality test. In simple cases often warned by the compiler; in many languages, deliberately guarded against by language syntax
[edit]Resource bugs
Null pointer dereference
Using an uninitialized variable
Using an otherwise valid instruction on the wrong data type (see packed decimal/binary coded decimal)
Access violations
Resource leaks, where a finite system resource such as memory or file handles are exhausted by repeated allocation without release.
Buffer overflow, in which a program tries to store data past the end of allocated storage. This may or may not lead to an access violation or storage violation. These bugs can form a security vulnerability.
Excessive recursion which though logically valid causes stack overflow
[edit]Multi-threading programming bugs
Deadlock
Race condition
Concurrency errors in Critical sections, Mutual exclusions and other features of concurrent processing. Time-of-check-to-time-of-use (TOCTOU) is a form of unprotected critical section.
[edit]Teamworking bugs
Unpropagated updates; e.g. programmer changes "myAdd" but forgets to change "mySubtract", which uses the same algorithm. These errors are mitigated by the Don't Repeat Yourself philosophy.
Comments out of date or incorrect: many programmers assume the comments accurately describe the code
Differences between documentation and the actual product
[edit]Bugs in popular culture

In the 1968 novel 2001: A Space Odyssey (and the corresponding 1968 film), a spaceship's onboard computer, HAL 9000, attempts to kill all its crew members. In the followup 1982 novel, 2010: Odyssey Two, and the accompanying 1984 film, 2010, it is revealed that this action was caused by the computer having been programmed with two conflicting objectives: to fully disclose all its information, and to keep the true purpose of the flight secret from the crew; this conflict caused HAL to become paranoid and eventually homicidal.
In the 1984 song 99 Red Balloons (though not in the original German version), "bugs in the software" lead to a computer mistaking a group of balloons for a nuclear missile and starting a nuclear war.
The 2004 novel The Bug, by Ellen Ullman, is about a programmer's attempt to find an elusive bug in a database application.
[edit]See also

        Software Testing portal
Anti-pattern
Bit rot
Bug tracking system
Glitch
ISO/IEC 9126, which classifies a bug as either a defect or a nonconformity
One-line fix
Software defect indicator
Software regression
Unusual software bugs (schroedinbug, heisenbug, Bohr bug, and mandelbug)
Workaround
Racetrack problem
[edit]Notes

^ The Chinook Helicopter Disaster
^ Software bugs cost US economy dear
^ Edison to Puskas, 13 November 1878, Edison papers, Edison National Laboratory, U.S. National Park Service, West Orange, N.J., cited in Thomas P. Hughes, American Genesis: A History of the American Genius for Invention, Penguin Books, 1989, ISBN 0-14-009741-4, on page 75.
^ "Baffle Ball". Internet Pinball Database. "(See image of advertisement in reference entry)"
^ FCAT[disambiguation needed] NRT Test, Harcourt, 18 March 2008
^ "Danis, Sharron Ann: "Rear Admiral Grace Murray Hopper"". ei.cs.vt.edu. 16 February 1997. Retrieved 31 January 2010.
^ "Bug", The Jargon File, ver. 4.4.7. Retrieved 3 June 2010.
^ a b "Log Book With Computer Bug", National Museum of American History, Smithsonian Institution.
^ "The First "Computer Bug", Naval Historical Center. But note the Harvard Mark II computer was not complete until the summer of 1947.
^ IEEE Annals of the History of Computing, Vol 22 Issue 1, 2000
^ First Computer Bug
^ Huizinga, Dorota; Kolawa, Adam (2007). Automated Defect Prevention: Best Practices in Software Management. Wiley-IEEE Computer Society Press. pp. 426. ISBN 0470042125.
^ McDonald, Marc; Musson, Robert; Smith, Ross (2007). The Practical Guide to Defect Prevention. Microsoft Press. pp. 480. ISBN 0735622531.
^ Maurice Wilkes Quotes
^ "Release Early, Release Often", Eric S. Raymond, The Cathedral and the Bazaar
^ "Wide Open Source", Elias Levy, SecurityFocus, 17 April 2000
^ Smith, Mark, What gets measured gets done, Cobalt Group, retrieved 8 April 2009
[edit]External links

Collection of Software Bugs (Thomas Huckle, TU München)
Computer-Related Incidents with Commercial Aircraft (Peter B. Ladkin et al., Universit&#228;t Bielefeld)
An Investigation of the Therac-25 Accidents (Nancy Leveson, University of Washington and Clark S. Turner, University of California at Irvine)
Fatal Dose: Radiation Deaths linked to AECL Computer Errors (Barbara Wade Rose, Canadian Coalition for Nuclear Responsibility)
Software Horror Stories (Nachum Dershowitz)
Software Does Not Fail (Paul Niquette]
Picture of the "first computer bug" The error of this term is elaborated above. (Naval Historical Center)
Page from 1947 log book with "first actual case of bug being found" (moth) (National Museum of American History)
The First Computer Bug! An email from 1981 about Adm. Hopper's bug
How to Report Bugs Effectively (Simon G. Tatham)
Rates of Design Failure
Bug Tracking Basics: A beginner’s guide to reporting and tracking defects (Mitch Allen)
History's Worst Software Bugs
Open source bug search engine
Bug Isolation Project - This project is to track bugs of popular open source software. (Packages for Fedora available)
Categories: Programming bugs


如果他写100%偷到,结果你没偷到,那是bug,但是人家作者没写,没写就代表结果不确定,可能偷到可能偷不到, ...
铁血意志 发表于 2010-8-27 12:50

[发帖际遇]: 大唐突厥在佛山巧遇钟阿四一家被凤天南强逼,花费银两23帮忙买鹅赔给凤天南。
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-28 00:22 | 显示全部楼层
好吧,何不换个角度解释?南贤的技能有明确的概率,那为什么北丑的没有?为什么作者不写80%或者100%?原因很简单,这不但不是BUG,相反的,这更能反应出玩家的差距。第一:南贤写了北丑没写就告诉了你偷盗肯定不是一定成功。第二:偷盗为何没有具体概率?因为偷盗概率不是一定的,可能有的东西容易偷,有的东西难偷,而实际上经过我测试,越快杀死被偷者,越快结束战斗,主角等级越高,偷盗成功率貌似就越高,另外有的东西几乎每次都能偷到,而有的东西就比较难。当然我没有实际数据。只是不完全测试。说到这楼主还认为这是BUG么?另外我想说,单机游戏和应用程序不一样,和网络游戏也不一样,我们写说明的时候经常会故意隐藏掉一些内容供人去研究,不会任何事情都说的很明白,如果按照楼主的说法,那么很多单机游戏都BUG无数了?做事情要讲究变通,定义是死的人是活的,所以有的时候还是要多思考思考

[发帖际遇]: xzqcm111在丐帮树林捡到一只叫花鸡,自己吃掉,被洪七公发现暴揍一顿,花掉医药费银两16。
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-28 00:27 | 显示全部楼层
我想起了说明和使用严重不符合的三侠

[发帖际遇]: 水镜四奇告诉瑛姑是裘千仞杀害了她的儿子,被裘千仞追杀失去银两28两。
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-28 00:31 | 显示全部楼层
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
头像被屏蔽
发表于 2010-8-28 01:13 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
 楼主| 发表于 2010-8-28 02:40 | 显示全部楼层
我可没说SL麻烦,问题的关键是不是满概率的东西你就应该指明,至少也得保持一致性。要不然,你就干脆连阿贤的那个概率也不要提。既然提了阿贤,就应该提阿丑。你标明了这是有概率的,玩家愿意SL的就SL没问替。可是你不标,玩家误解了以为偷盗100%成功,然后没偷到东西影响了玩家原先设计的培养方案,这难道不是缺陷,难道非要是服用了银子或者存不了盘才叫bug?是,没错,玩家吃了亏以后就知道了。可是还会有更多的新玩家不停的重复这一尴尬,这当然不会导致你玩不了游戏,但这一尴尬的结果不是玩家和设计者所预期的。我希望你不是金前工作组的,不然也太那个了。别人提意见还听不进去。

bug在电脑系统和程序中,被解释为缺陷,意指程序本身存在的问题,即系统漏洞.一般指电脑系统的硬件、 ...
铁血意志 发表于 2010-8-28 01:13

[发帖际遇]: 大唐突厥帮丘处机寻找杨家后人,却找到了郭靖,江南七怪打赏银两15。
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。
发表于 2010-8-28 22:09 | 显示全部楼层
【武侠.中国】铁血丹心论坛(大武侠):致力于推广和发展武侠文化,让我们一起努力,做全球最大的武侠社区。
可能是目前为止最好的金庸群侠传MOD游戏交流论坛,各种经典武侠游戏等你来玩,各种开源制作工具等你来实现你的游戏开发之梦。

本版积分规则

小黑屋|手机版|铁血丹心

GMT+8, 2024-12-23 21:58

Powered by Discuz! X3.4 Licensed

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表