Sciweavers

1062 search results - page 86 / 213
» Network games
Sort
View
NSDI
2008
15 years 4 days ago
Predicted and Observed User Behavior in the Weakest-link Security Game
We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-maki...
Jens Grossklags, Nicolas Christin, John Chuang
SIGMETRICS
2002
ACM
118views Hardware» more  SIGMETRICS 2002»
14 years 9 months ago
Robust traffic engineering: game theoretic perspective
On-line routing algorithms deal with requests as they arrive without assuming any knowledge of the underlying process that generates the streams of requests. By contrast, off-line...
Vladimir Marbukh
PDPTA
2000
14 years 11 months ago
Evaluating Multi user Distributed Action Games Architectures on a Corba Platform
The development of distributed applications is rapidly growing and some applications, like those which manipulate graphics, images and sounds, need special care. In this paper, we ...
Hendrik T. Macedo, Alessandro C. M. de Araú...
NETGAMES
2006
ACM
15 years 3 months ago
A practical pricing model of inter-domain multicasting based on game theory
— A practical pricing mechanism is the foundation for the deploying of IP multicast in the inter-domain Internet. The IP multicast service model and its pricing mechanism are dis...
Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao
NETGAMES
2006
ACM
15 years 3 months ago
Hack-proof synchronization protocol for multi-player online games
Synchronization protocols based on “dead-reckoning” are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair advantages by essen...
Yeung Siu Fung