Sciweavers

180 search results - page 28 / 36
» Security issues in online games
Sort
View
PDPTA
2004
13 years 9 months ago
Achieving Flow Level QoS in Cut-Through Networks Through Admission Control and DiffServ
Cluster networks will serve as the future access networks for multimedia streaming, massive multiplayer online gaming, e-commerce, network storage etc. And for those application ar...
Frank Olaf Sem-Jacobsen, Sven-Arne Reinemo, Tor Sk...
NETWORK
2006
84views more  NETWORK 2006»
13 years 7 months ago
VON: a scalable peer-to-peer network for virtual environments
: The scalability of large-scale networked virtual environments (NVEs) suchastoday's Massively Multiplayer Online Games (MMOGs) faces inherent limits imposed by the client-ser...
Shun-Yun Hu, Jui-Fa Chen, Tsu-Han Chen
SIGDIAL
2010
13 years 5 months ago
The Dynamics of Action Corrections in Situated Interaction
In spoken communications, correction utterances, which are utterances correcting other participants utterances and behaviors, play crucial roles, and detecting them is one of the ...
Antoine Raux, Mikio Nakano
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 2 months ago
On the Benefit of Virtualization: Strategies for Flexible Server Allocation
Abstract--Virtualization technology facilitates a dynamic, demanddriven allocation and migration of servers. This paper studies how the flexibility offered by network virtualizatio...
Dushyant Arora, Anja Feldmann, Gregor Schaffrath, ...
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
13 years 12 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...