Sciweavers

1191 search results - page 90 / 239
» Online Games and Security
Sort
View
CCS
2009
ACM
14 years 3 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
IADIS
2003
13 years 9 months ago
E-Democracy: Internet Voting
Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have ...
Guido Schryen
OTM
2007
Springer
14 years 2 months ago
OntoGame: Towards Overcoming the Incentive Bottleneck in Ontology Building
Despite significant advancement in ontology learning, building ontologies remains a task that highly depends on human intelligence, both as a source of domain expertise and for pro...
Katharina Siorpaes, Martin Hepp
CHI
2011
ACM
12 years 11 months ago
PhotoCity: training experts at large-scale image acquisition through a competitive game
Large-scale, ground-level urban imagery has recently developed as an important element of online mapping tools such as Google’s Street View. Such imagery is extremely valuable i...
Kathleen Tuite, Noah Snavely, Dun-yu Hsiao, Nadine...
ICDCS
2012
IEEE
11 years 10 months ago
G-COPSS: A Content Centric Communication Infrastructure for Gaming Applications
—With users increasingly focused on an online world, an emerging challenge for the network infrastructure is the need to support Massively Multiplayer Online Role Playing Games (...
Jiachen Chen, Mayutan Arumaithurai, Xiaoming Fu, K...