The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and...
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
Encryption is often not sufficient to secure communication, since it does not hide that communication takes place or who is communicating with whom. Covert channels hide the very existence of communication enabling individuals to communicate secretly. Previous work proposed a covert channel hidden inside multi-player first person shooter online game traffic (FPSCC). FPSCC has a low bit rate, but it...
More and more cyber-physical systems and the internet of things push for a multitude of devices and systems, which need to work together to provide the services as required by the users. Nevertheless, the speed of development and the heterogeneity of devices introduces considerable challenges in the development of such systems. This paper describes a solution being implemented in the setting of a...
NetsBlox is a visual blocks-based programming language extending Snap! with a few carefully selected abstractions to support distributed programming. In this paper, we argue that with the help of NetsBlox, some of the fundamental concepts of computer networking can be included in the high school computer science curriculum. Specifically, we describe a set of curricular units that would fit nicely...
In this practical experience report we discuss a court case in which one of the authors was expert witness. This UK civil case considered possible fraud in an online product promotion competition, with participants being denied prizes because they were considered to have cheated. The discussion in this paper aims to provide a practice-led perspective on the link between technology and legal issues...
Nowadays, collaborative systems and applications are widely used to allow multiple users to work together in order to achieve one same goal. In the field of virtual and augmented realities, such collaboration is often sought to effectuate complex activities in some relevant experiences. Users can share virtual objects, but most importantly, they use collaborative 3D interaction, visualize their objects...
Multi-user applications can be complex to develop due to their large or intricate nature. Many of the issues encountered are related to performance and security. These issues are exacerbated when the scale of the application increases. This paper introduces a novel distributed architecture called OpenGL|D (OpenGL Distributed). This technology enables an application to pass through the graphical calls...
Virtual Environments have become a compelling tool for various applications beyond gaming and Virtual Worlds, for example for education, collaborative engineering, or simulation and visualization. In the emerging field of smart environments, like Smart Cities and Smart Factories for industry or agriculture, a digital counterpart of a real world site, driven by hundreds of Internet of Things (IoT)...
Economic denial of sustainability (EDoS) is an emerging threat of cloud computing. This new form of attack is a breed of DDoS attack that exploits the volatility of cloud consumers utility cost model. EDoS attackers fraudulently consume resources that result multiple cloud instances due to auto scaling feature of cloud. Consequently, affected cloud consumer ends up with an excessive amount of payment...
We report on our research on proving the security of multi-party cryptographic protocols using the EASYCRYPT proof assistant. We work in the computational model using the sequence of games approach, and define honest-butcurious (semi-honest) security using a variation of the real/ideal paradigm in which, for each protocol party, an adversary chooses protocol inputs in an attempt to distinguish the...
Massively Multiplayer Online Games (MMOG), on which many users play simultaneously in a large scale virtual space on the Internet, have long been popular services. Most of MMOGs work based on Client / Server (C/S) model. Although C/S model is easy to manage games, it lacks scalability since the capacity of storages and the performance of servers that needs to be maintained by administrators increases...
Practical education about information security is needed for system developers and administrators in Web service suppliers. We propose a hacking contest CTF as attack and defense style with a website for a multiple online game. The contest organizer prepares a game server site as a contest environment which contains several vulnerability. The contest participants are divided into an attacker team...
Alternating direction method of multipliers (ADMM) is a promising approach to solve “big data” problems due to its efficient variable decomposition and fast convergence. However, it is subject to the following two fundamental assumptions: no contradiction among multiple controllers' objectives and ideal feedback from the agents to the controllers. In this paper, a multiple-leader multiple-follower...
Physical exercising has always had an important impact on humans' health. Lack of motivation is one of the major reasons that keeps a person from exercising. To overcome this problem, new solutions are needed to provide weight watchers and fitness seekers motivation to exercise indoors. This paper presents iGym, a low cost and flexible system that enhances humans' workout experience. This system lets...
We consider an infrastructure consisting of a network of systems each composed of discrete components that can be reinforced at a certain cost to guard against attacks. The network provides the vital connectivity between systems, and hence plays a critical, asymmetric role in the infrastructure operations. We characterize the system-level correlations using the aggregate failure correlation function...
Various research work have highlighted the importance of modeling learner's personality to provide a personalized computer based learning. In particular, questionnaire is the most used method to model personality which can be long and not motivating. This makes learners unwilling to take it. Therefore, this paper refers to Learning Analytics (LA) to implicitly model learners' personalities based on...
Rehabilitation robotic systems may afford better care and telerehabilitation may extend the use and benefits of robotic therapy to the home. Data transmissions over distance are bound by intrinsic communication delays which can be significant enough to deem the activity unfeasible. Here we describe an approach that combines unilateral robotic telerehabilitation and serious games. This approach has...
The aim of this paper is to compare the learning effectiveness and learning motivation of digital game-based learning between the competitive and the cooperative mode. Forty-seven junior high school students were invited to participate in the learning experiment. The students were divided into two groups and played Fragrance Channel in two different modes. Pre-and post-tests were used to evaluate...
Massive multiplayer online games are large-scaled distributed systems to handle a huge amount of simultaneous players. Thus, development costs can be enormous. To deal with this, it is necessary to reduce redundant development steps in such distributed systems, e.g. by using code generators and model analysers to build components from already existing knowledge. Such knowledge could be the unique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.