Sciweavers

1176 search results - page 153 / 236
» Exploiting Online Games
Sort
View
CW
2004
IEEE
15 years 2 months ago
Peer-to-Peer Networked Field-type Virtual Environment by Using AtoZ
This paper aims to study how to gain the consistency of the state in a DVE (Distributed Virtual Environment) with lag, under the condition of peer-to-peer architecture. That is, w...
Tatsuhiro Yonekura, Yoshihiro Kawano, Dai Hanawa
CIA
2006
Springer
15 years 2 months ago
Risk-Bounded Formation of Fuzzy Coalitions Among Service Agents
Cooperative autonomous agents form coalitions in order to share and combine resources and services to efficiently respond to market demands. With the variety of resources and servi...
Bastian Blankenburg, Minghua He, Matthias Klusch, ...
GECCO
2006
Springer
143views Optimization» more  GECCO 2006»
15 years 2 months ago
DECA: dimension extracting coevolutionary algorithm
Coevolution has often been based on averaged outcomes, resulting in unstable evaluation. Several theoretical approaches have used archives to provide stable evaluation. However, t...
Edwin D. de Jong, Anthony Bucci
NSDI
2008
15 years 1 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
AIRWEB
2008
Springer
15 years 22 days ago
A large-scale study of automated web search traffic
As web search providers seek to improve both relevance and response times, they are challenged by the ever-increasing tax of automated search query traffic. Third party systems in...
Gregory Buehrer, Jack W. Stokes, Kumar Chellapilla