Sciweavers

1176 search results - page 148 / 236
» Exploiting Online Games
Sort
View
ESORICS
2009
Springer
15 years 5 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
AIED
2009
Springer
15 years 5 months ago
Will Google destroy western democracy? Bias in policy problem solving
: Democracy requires students to choose policy positions based on evidence, yet confirmation bias prevents them from doing so. As a preliminary step in building a policy reasoning ...
Matthew W. Easterday, Vincent Aleven, Richard Sche...
APPROX
2009
Springer
142views Algorithms» more  APPROX 2009»
15 years 5 months ago
Truthful Mechanisms via Greedy Iterative Packing
An important research thread in algorithmic game theory studies the design of efficient truthful mechanisms that approximate the optimal social welfare. A fundamental question is ...
Chandra Chekuri, Iftah Gamzu
MM
2009
ACM
144views Multimedia» more  MM 2009»
15 years 5 months ago
Peer-assisted view-dependent progressive mesh streaming
Progressive mesh streaming is increasingly used in 3D networked applications, such as online games, virtual worlds, and digital museums. To scale such applications to a large numb...
Wei Cheng, Dan Liu, Wei Tsang Ooi
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
15 years 5 months ago
Venice, California and World of Warcraft: Persistence and Ephemerality in Playful Spaces
Persistent digital media extend content beyond immediate ephemeral interactions and conversations. Systems such as email, instant messaging, digital kiosks, social networking site...
Silvia Lindtner, Bonnie A. Nardi