Sciweavers

1191 search results - page 54 / 239
» Online Games and Security
Sort
View
ICDCS
2010
IEEE
13 years 12 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
ICS
2010
Tsinghua U.
14 years 5 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
DIGRA
2003
Springer
14 years 1 months ago
Developing a hybrid of MMORPG and LARP using usability methods: the case of Takkar
This paper examines the idea of combining Live Action Role-Playing (LARP) and MMORPG into a hybrid game named Takkar. We developed three versions of Takkar in an iterative fashion...
Laust Juul Christensen, Thomas Tae-Yang Jør...
ATAL
2008
Springer
13 years 10 months ago
Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Janusz Marecki, Fernando ...
AAAI
2010
13 years 9 months ago
Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games
Recently, algorithms for computing game-theoretic solutions have been deployed in real-world security applications, such as the placement of checkpoints and canine units at Los An...
Dmytro Korzhyk, Vincent Conitzer, Ronald Parr