Sciweavers

180 search results - page 27 / 36
» Security issues in online games
Sort
View
CSREASAM
2008
13 years 9 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
14 years 2 months ago
Venice, California and World of Warcraft: Persistence and Ephemerality in Playful Spaces
Persistent digital media extend content beyond immediate ephemeral interactions and conversations. Systems such as email, instant messaging, digital kiosks, social networking site...
Silvia Lindtner, Bonnie A. Nardi
COLCOM
2005
IEEE
14 years 1 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
ICIP
2005
IEEE
14 years 1 months ago
Complexity-aware live streaming system
Multimedia streaming is one of the most attractive services over the Internet, for which bandwidth is a primary constraint. For live streaming, however, the computational resource ...
Meng-Ting Lu, Chang-Kuan Lin, Jason Yao, Homer H. ...
DBISP2P
2004
Springer
162views Database» more  DBISP2P 2004»
14 years 1 months ago
CISS: An Efficient Object Clustering Framework for DHT-Based Peer-to-Peer Applications
Distributed Hash Tables (DHTs) have been widely adopted in many Internet-scale P2P systems. Emerging P2P applications such as massively multi player online games (MMOGs) and P2P ca...
Jinwon Lee, Hyonik Lee, Seungwoo Kang, Sungwon Pet...