Sciweavers

1191 search results - page 40 / 239
» Online Games and Security
Sort
View
PROVSEC
2007
Springer
14 years 2 months ago
Formal Proof of Provable Security by Game-Playing in a Proof Assistant
Game-playing is an approach to write security proofs that are easy to verify. In this approach, security definitions and intractable problems are written as programs called games ...
Reynald Affeldt, Miki Tanaka, Nicolas Marti
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
NETGAMES
2006
ACM
14 years 2 months ago
Cellular automata and Hilditch thinning for extraction of user paths in online games
ÌÓ Ô ÓÒÐ Ò Ñ × ÒØ Ö ×Ø Ò ØÓ Ø Ö ÔÐ Ý Ö׸ Ø × Ñ¹ ÔÓÖØ ÒØ ØÓ Ø Ø ÔÐ Ý Ö׳ Ú ÓÖ׺ ÁÒ Ø × Ô Ô Ö¸ Ò ÓÖ Ö ØÓ ÙÒ Ö×Ø ...
Ruck Thawonmas, Masayasu Hirano, Masayoshi Kurashi...
DIGRA
2005
Springer
14 years 1 months ago
Online Gaming as a Virtual Forum
Matthew Payne
DIGRA
2005
Springer
14 years 1 months ago
Where Everybody Knows Your (Screen) Name: Online Games as "Third Places"
Constance Steinkuehler, Dmitri Williams