OpenLink Software

Usage stats on Manipulated Shuriken Technique

 Permalink

an Entity in Data Space: 134.155.108.49:8890

The first attack is not designed to hit the enemy and is usually avoided and, after a time-lag of several seconds, it will come from behind. Depending on the performance and skill of the user, the possible tactics this technique offers can be near infinite. This technique can be further altered by predicting an opponents movements, requiring a Sharingan.

Graph IRICount
http://dbkwik.webdatacommons.org33
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] This material is Open Knowledge Creative Commons License Valid XHTML + RDFa
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Copyright © 2009-2012 OpenLink Software