Sciweavers

367 search results - page 21 / 74
» Security Design in Online Games
Sort
View
ATAL
2011
Springer
12 years 8 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
FPLAY
2008
13 years 9 months ago
Construction of cybertypes in Lineage II: an analysis of game interfaces and support documentation
This paper discusses social exclusion by analyzing the avatar creation interface of the massively multiplayer online roleplaying game (MMORPG) Lineage II. We use a previously deve...
Victoria McArthur, Tyler M. Pace, Aaron R. Houssia...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 10 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
TEDU
2008
126views Education» more  TEDU 2008»
13 years 7 months ago
Designing an Educational Game: Case Study of 'Europe 2045'
This paper presents a theoretical framework, which has been adopted in designing an on-line multi-player strategy game Europe 2045. Europe 2045 is an educational tool for high scho...
Vít Sisler, Cyril Brom
IWEC
2008
13 years 9 months ago
Game Bot Detection Based on Avatar Trajectory
In recent years, online gaming has become one of the most popular Internet activities, but cheating activity, such as the use of game bots, has increased as a consequence. Generall...
Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Kenneth Pao, ...