Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Given rapid improvements in network infrastructure and streaming-media technologies, a large number of corporations and universities are recording lectures and making them availab...
Qiong Liu, Yong Rui, Anoop Gupta, Jonathan J. Cadi...
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Videogames now enable players to spend virtual fortunes on exotic virtual goods and even create and sell virtual artefacts. Online consumers may also browse endlessly through virt...