The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We studied the dynamic network of relationships among avatars in the massively multiplayer online game Planetside 2. In the spring of 2014, two separate servers of this game were merged, and as a result, two previously distinct networks were combined into one. We observed the evolution of this network in the seven month period following the merger. We found that some structures of original networks...
A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. It is one of the most important technical and policy challenges in cybersecurity. The lack of ground truth for an individual responsible for an attack has limited previous studies. In this paper, we take a first step towards overcoming this limitation...
Minecraft is one of the most popular games among youth today, experiencing sales over 100 million worldwide and channels on YouTube generating over 47 billion views. Our interest in the game environment is due to its innate computational mechanics that integrate logic, design, and scripting elements. Because of these traits, many organizations and schools are looking to incorporate Minecraft into...
In several critical infrastructures correlations between the constituent systems represent certain vulnerabilities: disruptions to one may propagate to others and possibly to the entire infrastructure. The correlations between the systems are characterized in two ways in this paper: (i) the aggregate failure correlation function specifies the conditional failure probability of the infrastructure given...
This paper introduces cross-stratum orchestration architecture that is aimed to support an end-to-end orchestration of application services. This paper then expands the concept of CSO as a viable architecture and discusses issues and requirements for two challenging use cases: game server dynamic VM mobility and 5G Transport (5GT).
Advanced Persistent Threat, one of the most popular network attacks, has drawn great attention of all over the world because of its huge perniciousness. As the excellent imperceptibility as well as long-term persistence in APT attack, this paper proposes a prediction model based on dynamin Bayesian game. Focusing on the particular features in APT, a corresponding quantitative method is proposed for...
The WTFast’s Gamers Private Network (GPN R ) is a client/server solution that makes online games faster. GPN connects online video-game players with a common game service across a wide-area network. Online games are interactive competitions by individual players who compete in a virtual environment. Response time, latency and its predictability are keys to GPN success and runs against the vast complexity...
This paper discusses a new online tool for online gamers to share networking performance results and to produce aggregate networking performance reports generated from the data reported by all users. It is necessary to improve the quality of service and make online games faster. This will help improve latency sensitive game data collection. It will help to improve gaming performance through the global...
An adversary who has obtained the cryptographic hash of a user's password can mount an offline attack to crack the password by comparing this hash value with the cryptographic hashes of likely password guesses. This offline attacker is limited only by the resources he is willing to invest to crack the password. Key-stretching techniques like hash iteration and memory hard functions have been proposed...
Background. The rise in cases of motor impairing illnesses demands the research for improvements in rehabilitation therapy. The study of robotics for enhancing motor recovery has been gaining momentum, but there is still little standardization of tools. Objectives. This paper shows the current development state of a proposed new robotic treatment platform, primarily geared towards post-stroke cases,...
A virtual world engine at the massively multiplayer scale is a massively multiplayer online world (MMOW); one thing virtual world engines realized when going into the scale of MMOs, is the cost of maintaining a potentially quadratic number of interactions between a massive number of objects, laid out in a spatial dimension. With the rise of the Internet of Things (IoT), this means recognizing the...
In recent years, there has been an important growth in online gaming. Nowadays, Massively Multiplayer Online Games (MMOGs) may involve millions of synchronous players scattered around the world and engaging with each other within a single shared game. In this paper, we propose a new technique to communicate between players and game server, and between them based on hybrid Peer-to-Peer architecture...
This paper discuss the project results of the centralized storage for the client generated statistical data. The project aims was to fill the following requirements: (1) a new web API where local client statistics can be reported to a highly scalable and redundant central database, (2) to enable a user to easily save/share their connection results on a separate webpage, or with a widget that could...
Wireless caching has been used to improve network performance and reduce bandwidth and energy consumption. In this paper, we study the issue of joint admission control and content caching for wireless access points with energy harvesting capability. Given limited energy supply, the access points, in a competitive environment, aim to maximize their payoff defined in terms of revenue by optimizing their...
Because of various reasons: cuts in financing, students massive participation in full-time work, rapidly improving technological possibilities etc. the university education is massively moving online and direct classroom contact of teachers with students is replaced with computer network mediated communication, where features of educational processes should be extracted by analyzing data created in...
Attribute-Based Encryption (ABE) is a public key encryption scheme that allows users to encrypt and decrypt messages based on user attributes. In this paper, we consider the problem of constructing a ciphertext-policy attribute-based encryption (CP-ABE) scheme in a setting where the attributes distributor is also the owner of messages that are to be encrypted and shared. The CP-ABE scheme we propose...
Mobile Edge Computing (MEC) provides computation capabilities within the radio access network and in close proximity to mobile users, so as to enrich user experience. In this paper, we consider a multi-cell MEC scenario, where the small cells are densely deployed and serve multiple mobile users. However, the finite computation resources of MEC server and severe inter-cell interference limit the scalability...
Even though demand response of datacenters recently has received increasing attention due to huge demands and flexible power control knobs, most of current studies focus on the owner-operated datacenters, leaving behind another critical segment of datacenter business: multi-tenant colocation. In colocation datacenters, while there exist multiple tenants who manage their own servers, the colocation...
Cloud federation has emerged as an effective solution offering worldwide coverage, dynamic infrastructure scaling and improved QoS for the demanding cloud services. In this paper, we present a model for Cloud Service Providers (CSPs) federation and we investigate the economic benefits of CSPs under different federation modes. Each CSP is modeled as an M/M/1 queue with arrivals corresponding to computation...
With the increasing popularity of data services and applications, data center networks have been introduced to serve users in a centralized fashion. Furthermore, the flexibility of the data service subscribers' (DSSs') requirements motivates data center virtualization so as to optimize the resource allocation among all DSSs. However, as the massive data centers are usually far away from the DSSs,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.