Sciweavers

10 search results - page 2 / 2
» Addressing cheating in distributed MMOGs
Sort
View
NETGAMES
2006
ACM
13 years 11 months ago
Authority assignment in distributed multi-player proxy-based games
We present a proxy-based gaming architecture and authority assignment within this architecture that can lead to better game playing experience in Massively Multi-player Online gam...
Sudhir Aggarwal, Justin Christofoli, Sarit Mukherj...
CLUSTER
2005
IEEE
13 years 11 months ago
Toward an Optimal Redundancy Strategy for Distributed Computations
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The related computation integrity concerns are commonly...
Doug Szajda, Barry Lawson, Jason Owen
PODC
2003
ACM
13 years 11 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...
AIRWEB
2007
Springer
13 years 12 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
SIGECOM
2003
ACM
97views ECommerce» more  SIGECOM 2003»
13 years 11 months ago
A robust open ascending-price multi-unit auction protocol against false-name bids
This paper presents a new ascending-price multi-unit auction protocol. As far as the authors are aware, this is the first protocol that has an open format, and in which sincere b...
Atsushi Iwasaki, Makoto Yokoo, Kenji Terada