Sciweavers

1176 search results - page 49 / 236
» Exploiting Online Games
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
CHI
2007
ACM
14 years 10 months ago
Coordinating joint activity in avatar-mediated interaction
Massively multiplayer online games (MMOGs) currently represent the most widely used type of social 3D virtual worlds with millions of users worldwide. Although MMOGs take face-to-...
Robert J. Moore, E. Cabell Hankinson Gathman, Nico...
CCS
2009
ACM
14 years 4 months ago
Fides: remote anomaly-based cheat detection using client emulation
As a result of physically owning the client machine, cheaters in online games currently have the upper-hand when it comes to avoiding detection. To address this problem and turn t...
Edward C. Kaiser, Wu-chang Feng, Travis Schluessle...
DIGRA
2003
Springer
14 years 2 months ago
Developing a hybrid of MMORPG and LARP using usability methods: the case of Takkar
This paper examines the idea of combining Live Action Role-Playing (LARP) and MMORPG into a hybrid game named Takkar. We developed three versions of Takkar in an iterative fashion...
Laust Juul Christensen, Thomas Tae-Yang Jør...
FPLAY
2008
13 years 11 months ago
Construction of cybertypes in Lineage II: an analysis of game interfaces and support documentation
This paper discusses social exclusion by analyzing the avatar creation interface of the massively multiplayer online roleplaying game (MMORPG) Lineage II. We use a previously deve...
Victoria McArthur, Tyler M. Pace, Aaron R. Houssia...