Sciweavers

1191 search results - page 54 / 239
» Online Games and Security
Sort
View
ICDCS
2010
IEEE
15 years 3 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
ICS
2010
Tsinghua U.
15 years 8 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
DIGRA
2003
Springer
15 years 4 months ago
Developing a hybrid of MMORPG and LARP using usability methods: the case of Takkar
This paper examines the idea of combining Live Action Role-Playing (LARP) and MMORPG into a hybrid game named Takkar. We developed three versions of Takkar in an iterative fashion...
Laust Juul Christensen, Thomas Tae-Yang Jør...
ATAL
2008
Springer
15 years 1 months ago
Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Janusz Marecki, Fernando ...
AAAI
2010
15 years 19 days ago
Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games
Recently, algorithms for computing game-theoretic solutions have been deployed in real-world security applications, such as the placement of checkpoints and canine units at Los An...
Dmytro Korzhyk, Vincent Conitzer, Ronald Parr