Sciweavers

367 search results - page 24 / 74
» Security Design in Online Games
Sort
View
CCS
2008
ACM
15 years 3 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
124
Voted
CHI
2009
ACM
16 years 2 months ago
Designing a privacy label: assisting consumer understanding of online privacy practices
This project describes the continuing development of a Privacy Label to present to consumers the ways organizations collect, use, and share personal information. Several studies h...
Patrick Gage Kelley
ACMACE
2004
ACM
15 years 7 months ago
Extending game participation with embodied reporting agents
We introduce a multi-agent framework to generate reports of players' activities within multi-player computer games so that other players who are currently unable to participa...
Dan Fielding, Mike Fraser, Brian Logan, Steve Benf...
110
Voted
CHI
2011
ACM
14 years 5 months ago
Starcraft from the stands: understanding the game spectator
Video games are primarily designed for the players. However, video game spectating is also a popular activity, boosted by the rise of online video sites and major gaming tournamen...
Gifford Cheung, Jeff Huang
114
Voted
ACMACE
2010
ACM
14 years 9 months ago
Exploiting MMORPG log data toward efficient RMT player detection
To detect players who are engaged in real-money trading (RMT) in massively multi-player online role-playing games (MMORPGs), behavior of players was analyzed using log data of a c...
Hiroshi Itsuki, Asuka Takeuchi, Atsushi Fujita, Hi...