5,221 research outputs found
Mobile Online Gaming via Resource Sharing
Mobile gaming presents a number of main issues which remain open. These are
concerned mainly with connectivity, computational capacities, memory and
battery constraints. In this paper, we discuss the design of a fully
distributed approach for the support of mobile Multiplayer Online Games (MOGs).
In mobile environments, several features might be exploited to enable resource
sharing among multiple devices / game consoles owned by different mobile users.
We show the advantages of trading computing / networking facilities among
mobile players. This operation mode opens a wide number of interesting sharing
scenarios, thus promoting the deployment of novel mobile online games. In
particular, once mobile nodes make their resource available for the community,
it becomes possible to distribute the software modules that compose the game
engine. This allows to distribute the workload for the game advancement
management. We claim that resource sharing is in unison with the idea of ludic
activity that is behind MOGs. Hence, such schemes can be profitably employed in
these contexts.Comment: Proceedings of 3nd ICST/CREATE-NET Workshop on DIstributed SImulation
and Online gaming (DISIO 2012). In conjunction with SIMUTools 2012.
Desenzano, Italy, March 2012. ISBN: 978-1-936968-47-
Is a Technological Singularity near also for bots in MMOGs?
Using the idea of the Technological Singularity this essay offers some reflections on the possible future of bots in Massively Multiplayer Online Games (MMOGs). The paper starts by briefly introducing the notion of Technological Singularity as the advent of a super-intelligent Artificial Intelligence that could threaten human existence. Bots are computer programs that automate repetitive and time consuming activities for the Internet user. In MMOGs, bots are often used to cheat and could have nefarious effects on the gameplay. Assuming that bots are rudimentary forms of Artificial Intelligence that also pose a threat to MMOGs and their players, the paper presents some evidence-based trends of the future evolution of bots and the implications of these for Virtual Worlds research
Surveillant assemblages of governance in massively multiplayer online games:a comparative analysis
This paper explores governance in Massively Multiplayer Online Games (MMOGs), one sub-sector of the digital games industry. Informed by media governance studies, Surveillance Studies, and game studies, this paper identifies five elements which form part of the system of governance in MMOGs. These elements are: game code and rules; game policies; company community management practices; player participatory practices; and paratexts. Together these governance elements function as a surveillant assemblage, which relies to varying degrees on lateral and hierarchical forms of surveillance, and the assembly of human and nonhuman elements.Using qualitative mixed methods we examine and compare how these elements operate in three commercial MMOGs: Eve Online, World of Warcraft and Tibia. While peer and participatory surveillance elements are important, we identified two major trends in the governance of disruptive behaviours by the game companies in our case studies. Firstly, an increasing reliance on automated forms of dataveillance to control and punish game players, and secondly, increasing recourse to contract law and diminishing user privacy rights. Game players found it difficult to appeal the changing terms and conditions and they turned to creating paratexts outside of the game in an attempt to negotiate the boundaries of the surveillant assemblage. In the wider context of self-regulated governance systems these trends highlight the relevance of consumer rights, privacy, and data protection legislation to online games and the usefulness of bringing game studies and Surveillance Studies into dialogue
Cloud for Gaming
Cloud for Gaming refers to the use of cloud computing technologies to build
large-scale gaming infrastructures, with the goal of improving scalability and
responsiveness, improve the user's experience and enable new business models.Comment: Encyclopedia of Computer Graphics and Games. Newton Lee (Editor).
Springer International Publishing, 2015, ISBN 978-3-319-08234-
Recommended from our members
Why Swedish people play online poker and factors that can increase or decrease trust in poker websites: a qualitative investigation
Three face-to-face focus groups that included 24 online poker players were conducted in Stockholm to investigate their motivations for playing online poker and issues relating to their trust of poker Web sites. Casual players played because they liked the convenience, the ease of learning, the low stake size, the relief from boredom, and the social interactions. “Professional” players played to win money and utilised several features of the online game for psychological tactics. They also tended to play several tables at once. Factors that affected how much a player would trust an online poker Web site included the size and reputation of the operator, the speed with which winnings were paid out, the clarity of the Web site design, the technical reliability of the service, and the accessibility and effectiveness of the customer service. Responsible gaming measures also increased levels of trust by demonstrating company integrity and by reducing anxiety about winning from other players. The findings indicate that providing a safe online environment with effective responsible gaming measures may be much more than just a moral and regulatory requirement. Players in this study suggested that such features are sometimes necessary in order to achieve an enjoyable gaming experience. Consequently, responsible gaming initiatives and good business practice do not have to be mutually exclusive. Indeed, in this particular scenario, they might even be considered mutually dependent. This project was funded by Svenska Spel, the operators of the Swedish National Lottery. Other than agreeing to the research question, Svenska Spel had no say in how the research was carried out, the results that were reported, the conclusions that were drawn, or the editing of the report
e-Authentication for online assessment: A mixed-method study
Authenticating the students’ identity and authenticity of their work is increasingly important to reduce academic malpractices and for quality assurance purposes in Education. There is a growing body of research about technological innovations to combat cheating and plagiarism. However, the literature is very limited on the impact of e-authentication systems across distinctive end-users because it is not a widespread practice at the moment. A considerable gap is to understand whether the use of e-authentication systems would increase trust on e-assessment, and to extend, whether students’ acceptance would vary across gender, age and previous experiences. This study aims to shed light on this area by examining the attitudes and experiences of 328 students who used an authentication system known as adaptive trust-based e-assessment system for learning (TeSLA). Evidence from mixed-method analysis suggests a broadly positive acceptance of these e-authentication technologies by distance education students. However, significant differences in the students’ responses indicated, for instance, that men were less concerned about providing personal data than women; middle-aged participants were more aware of the nuances of cheating and plagiarism;while younger students were more likely to reject e-authentication, considerably due to data privacy and security and students with disabilities due to concerns about their special needs
- …