• DocumentCode
    1279819
  • Title

    Ender Wiggin Played Mafia Wars Too

  • Author

    Laplante, Phillip A.

  • Author_Institution
    Pennsylvania State Univ., University Park, PA, USA
  • Volume
    13
  • Issue
    4
  • fYear
    2011
  • Firstpage
    6
  • Lastpage
    8
  • Abstract
    Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good (such as solving large resource allocation problems or finding improvised explosive devices) or for evil (to allow criminals to gain unauthorized access to a system or break encryption algorithms). Surreptitious processing networks differ from botnets in that no rouge processing elements are present on the user side; instead, the computational payload is outsourced to humans who unknowingly provide partial solutions as they play the game. This approach makes the solution of large computational problems and the recruitment and exploitation of participants easy. This department is part of a special issue on social networking.
  • Keywords
    computer games; cryptography; mobile computing; mobile radio; social networking (online); Ender Wiggin; botnets; encryption algorithms; gaming servers; improvised explosive device finding; mafia wars; mobile phones; resource allocation problems; social networks; surreptitious processing networks; unauthorized access; Data processing; Games; Parallel processing; Social network services; Keywords: Gameplay; NP-complete problems; NP-hard problems; crowdsourcing; information technology; social networks; surreptitious problem solving;
  • fLanguage
    English
  • Journal_Title
    IT Professional
  • Publisher
    ieee
  • ISSN
    1520-9202
  • Type

    jour

  • DOI
    10.1109/MITP.2011.60
  • Filename
    5960017