By Topic

Ender Wiggin Played Mafia Wars Too

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Laplante, P.A. ; Pennsylvania State Univ., University Park, PA, USA

Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good (such as solving large resource allocation problems or finding improvised explosive devices) or for evil (to allow criminals to gain unauthorized access to a system or break encryption algorithms). Surreptitious processing networks differ from botnets in that no rouge processing elements are present on the user side; instead, the computational payload is outsourced to humans who unknowingly provide partial solutions as they play the game. This approach makes the solution of large computational problems and the recruitment and exploitation of participants easy. This department is part of a special issue on social networking.

Published in:

IT Professional  (Volume:13 ,  Issue: 4 )