Sciweavers

948 search results - page 22 / 190
» Making a Game of Network Security
Sort
View
AGENTS
2000
Springer
14 years 7 days ago
A game-theoretic formulation of multi-agent resource allocation
This paper considers resource allocation in a network with mobile agents competing for computational priority. We formulate this problem as a multi-agent game with the players bei...
Jonathan Bredin, Rajiv T. Maheswaran, Çagri...
MOBIDE
2009
ACM
14 years 3 months ago
Demonstrating an evacuation algorithm with mobile devices using an e-scavenger hunt game
×Ù ÐØ × Ò Ñ Ö Ò Ý × ØÙ Ø ÓÒ× Ö Ó Ø Ò Ù× Ý Ô Ò Ò Ò × × Û Ö Ù Ð Ò Ú Ù Ø ÓÒ × Ö ÕÙ Ö ¸ Ø Ý Ö Ó Ø Ò Ù× Ý ×ÓÖ Ò Þ Ú ...
Jesse Szwedko, Callen Shaw, Alexander G. Connor, A...
CCS
2004
ACM
14 years 11 days ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
EL
2002
181views more  EL 2002»
13 years 8 months ago
Aspects of networking in multiplayer computer games
Distributed, real-time multiplayer computer games (MCGs) are in the vanguard of utilizing the networking possibilities. Although related research have been done in military simulat...
Jouni Smed, Timo Kaukoranta, Harri Hakonen
ADHOCNOW
2007
Springer
14 years 2 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...