Sciweavers

948 search results - page 178 / 190
» Making a Game of Network Security
Sort
View
IEEESP
2011
14 years 1 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
VR
2007
IEEE
179views Virtual Reality» more  VR 2007»
15 years 4 months ago
On the Characterization of Peer-To-Peer Distributed Virtual Environments
Large scale distributed virtual environments (DVEs) have become a major trend in distributed applications, mainly due to the enormous popularity of multi-player online games in th...
Silvia Rueda, Pedro Morillo, Juan M. Orduña...
DIGRA
2005
Springer
15 years 3 months ago
Framing Virtual Law
Building on the work of games theorists and virtual world designers, this paper proposes a framework for understanding the real-virtual dichotomy in terms of a series of five fram...
Peter Edelmann
76
Voted
CLOUD
2010
ACM
15 years 2 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
GECCO
2010
Springer
184views Optimization» more  GECCO 2010»
15 years 2 months ago
Transfer learning through indirect encoding
An important goal for the generative and developmental systems (GDS) community is to show that GDS approaches can compete with more mainstream approaches in machine learning (ML)....
Phillip Verbancsics, Kenneth O. Stanley