Sciweavers

1191 search results - page 67 / 239
» Online Games and Security
Sort
View
ACMACE
2010
ACM
13 years 3 months ago
Exploiting MMORPG log data toward efficient RMT player detection
To detect players who are engaged in real-money trading (RMT) in massively multi-player online role-playing games (MMORPGs), behavior of players was analyzed using log data of a c...
Hiroshi Itsuki, Asuka Takeuchi, Atsushi Fujita, Hi...
ATAL
2004
Springer
14 years 1 months ago
Temptation and Contribution in C2C Transactions: Implications for Designing Reputation Management Systems
: A reputation management system can promote trust in transactions in an online consumer-to-consumer (C2C) market. We model a C2C market by employing an agent-based approach. To di...
Hitoshi Yamamoto, Kazunari Ishida, Toshizumi Ohta
HICSS
2008
IEEE
104views Biometrics» more  HICSS 2008»
14 years 2 months ago
Virtual Experiential Marketing on Online Customer Intentions and Loyalty
Advances in information and web technologies have open numerous opportunities for online retailing. The pervasiveness of the Internet coupled with the keenness in competition amon...
Jashen Chen, Russell K. H. Ching, Margaret Meiling...
NPL
2000
105views more  NPL 2000»
13 years 7 months ago
Online Interactive Neuro-evolution
In standard neuro-evolution, a population of networks is evolved in a task, and the network that best solves the task is found. This network is then fixed and used to solve future...
Adrian K. Agogino, Kenneth O. Stanley, Risto Miikk...
KIVS
2009
Springer
14 years 20 days ago
Banishing Patch-Cables from LAN Parties
Abstract. Although playing real-time multi-player games online over the Internet became more and more popular in the past few years, people still enjoy meeting for so-called “LAN...
Peter Baumung