Sciweavers

1100 search results - page 156 / 220
» Exertion in networked games
Sort
View
MOBICOM
2012
ACM
13 years 3 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
WISEC
2010
ACM
15 years 7 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
99
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
CEC
2009
IEEE
15 years 5 months ago
Conformity and network effects in the Prisoner's Dilemma
— We study the evolution of cooperation using the Prisoner’s Dilemma as a metaphor of the tensions between cooperators and non-cooperators, and evolutionary game theory as the ...
José María Peña, Enea Pestela...
NETWORK
2006
84views more  NETWORK 2006»
15 years 22 days ago
VON: a scalable peer-to-peer network for virtual environments
: The scalability of large-scale networked virtual environments (NVEs) suchastoday's Massively Multiplayer Online Games (MMOGs) faces inherent limits imposed by the client-ser...
Shun-Yun Hu, Jui-Fa Chen, Tsu-Han Chen