Sciweavers

1176 search results - page 4 / 236
» Exploiting Online Games
Sort
View
ATAL
2008
Springer
13 years 9 months ago
MB-AIM-FSI: a model based framework for exploiting gradient ascent multiagent learners in strategic interactions
Future agent applications will increasingly represent human users autonomously or semi-autonomously in strategic interactions with similar entities. Hence, there is a growing need...
Doran Chakraborty, Sandip Sen
NETGAMES
2003
ACM
14 years 21 days ago
On the geographic distribution of on-line game servers and players
With a shift in the on-line gaming landscape from individually hosted game servers, to gaming services centrally hosted by game publishers, game console manufacturers, and third-p...
Wu-chang Feng, Wu-chi Feng
EL
2002
134views more  EL 2002»
13 years 7 months ago
Security issues in online games
The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games. Althou...
Jianxin Jeff Yan, Hyun-Jin Choi
ACSAC
2003
IEEE
14 years 23 days ago
Security Design in Online Games
The emergence of online games has fundamentally changed security requirements for computer games, which previously were largely concerned with copy protection. In this paper, we e...
Jeff Jianxin Yan
ICPR
2008
IEEE
14 years 8 months ago
Making real games virtual: Tracking board game pieces
The same game is often played in real and virtual worlds. We integrate in-person and on-line playing of board games such as Go, bringing the real world into the virtual world. A p...
Steven Scher, Ryan Crabb, James Davis