Sciweavers

1191 search results - page 29 / 239
» Online Games and Security
Sort
View
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 10 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
DIGRA
2005
Springer
14 years 1 months ago
Beyond P-1: Who Plays Online?
Academics and industry professionals alike have long been interested in developing a nuanced and empirically sound typography of online gamers. Designers and engineers are aware o...
Avery Alix
CSCW
2008
ACM
13 years 9 months ago
A hybrid cultural ecology: world of warcraft in China
We analyze online gaming as a site of collaboration in a digital-physical hybrid. We ground our analysis in findings from an ethnographic study of the online game World of Warcraf...
Silvia Lindtner, Bonnie A. Nardi, Yang Wang 0005, ...
AIIDE
2008
13 years 10 months ago
Difficulty Scaling through Incongruity
In this paper we discuss our work on using the incongruity measure from psychological literature to scale the difficulty level of a game online to the capabilities of the human pl...
Giel van Lankveld, Pieter Spronck, Matthias Rauter...
IICS
2009
Springer
14 years 2 months ago
Splitting Overlay Network for Peer-to-Peer-based Massively Multiplayer Online Games
: Massively Multiplayer Online Games (MMOGs) gradually become one of the most popular internet applications. Traditional client-server architecture is widely used in MMOGs’ deplo...
Cheng Liu, Wentong Cai