Ender Wiggin played mafia wars too

Research output: Contribution to journalArticle

Abstract

Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good (such as solving large resource allocation problems or finding improvised explosive devices) or for evil (to allow criminals to gain unauthorized access to a system or break encryption algorithms). Surreptitious processing networks differ from botnets in that no rouge processing elements are present on the user side; instead, the computational payload is outsourced to humans who unknowingly provide partial solutions as they play the game. This approach makes the solution of large computational problems and the recruitment and exploitation of participants easy. This department is part of a special issue on social networking.

Original languageEnglish (US)
Article number5960017
Pages (from-to)6-8
Number of pages3
JournalIT Professional
Volume13
Issue number4
DOIs
StatePublished - Jul 1 2011

Fingerprint

Processing
Mobile phones
Resource allocation
Cryptography
Servers
Botnet

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Science Applications
  • Hardware and Architecture

Cite this

@article{7f4c91fbe3f440bb982402985c9b410f,
title = "Ender Wiggin played mafia wars too",
abstract = "Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good (such as solving large resource allocation problems or finding improvised explosive devices) or for evil (to allow criminals to gain unauthorized access to a system or break encryption algorithms). Surreptitious processing networks differ from botnets in that no rouge processing elements are present on the user side; instead, the computational payload is outsourced to humans who unknowingly provide partial solutions as they play the game. This approach makes the solution of large computational problems and the recruitment and exploitation of participants easy. This department is part of a special issue on social networking.",
author = "Laplante, {Phillip A.}",
year = "2011",
month = "7",
day = "1",
doi = "10.1109/MITP.2011.60",
language = "English (US)",
volume = "13",
pages = "6--8",
journal = "IT Professional",
issn = "1520-9202",
publisher = "IEEE Computer Society",
number = "4",

}

Ender Wiggin played mafia wars too. / Laplante, Phillip A.

In: IT Professional, Vol. 13, No. 4, 5960017, 01.07.2011, p. 6-8.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Ender Wiggin played mafia wars too

AU - Laplante, Phillip A.

PY - 2011/7/1

Y1 - 2011/7/1

N2 - Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good (such as solving large resource allocation problems or finding improvised explosive devices) or for evil (to allow criminals to gain unauthorized access to a system or break encryption algorithms). Surreptitious processing networks differ from botnets in that no rouge processing elements are present on the user side; instead, the computational payload is outsourced to humans who unknowingly provide partial solutions as they play the game. This approach makes the solution of large computational problems and the recruitment and exploitation of participants easy. This department is part of a special issue on social networking.

AB - Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good (such as solving large resource allocation problems or finding improvised explosive devices) or for evil (to allow criminals to gain unauthorized access to a system or break encryption algorithms). Surreptitious processing networks differ from botnets in that no rouge processing elements are present on the user side; instead, the computational payload is outsourced to humans who unknowingly provide partial solutions as they play the game. This approach makes the solution of large computational problems and the recruitment and exploitation of participants easy. This department is part of a special issue on social networking.

UR - http://www.scopus.com/inward/record.url?scp=79960968739&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79960968739&partnerID=8YFLogxK

U2 - 10.1109/MITP.2011.60

DO - 10.1109/MITP.2011.60

M3 - Article

AN - SCOPUS:79960968739

VL - 13

SP - 6

EP - 8

JO - IT Professional

JF - IT Professional

SN - 1520-9202

IS - 4

M1 - 5960017

ER -