Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
This paper discusses social exclusion by analyzing the avatar creation interface of the massively multiplayer online roleplaying game (MMORPG) Lineage II. We use a previously deve...
Victoria McArthur, Tyler M. Pace, Aaron R. Houssia...
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
This paper presents a theoretical framework, which has been adopted in designing an on-line multi-player strategy game Europe 2045. Europe 2045 is an educational tool for high scho...
In recent years, online gaming has become one of the most popular Internet activities, but cheating activity, such as the use of game bots, has increased as a consequence. Generall...
Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Kenneth Pao, ...