Limpar
4 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo

Grenville Armitage,

... 10 million probe packets from two topologically distinct Wolfenstein enemy territory servers in 2006, this paper shows that probe ...

Tópico(s): Complex Network Analysis Techniques

2007 - Institute of Electrical and Electronics Engineers | ˜The œ... IEEE International Conference on Networks/˜The œIEEE International Conference on Networks

Capítulo de livro Acesso aberto Revisado por pares

Grenville Armitage,

... from Valve's Counterstrike:Source and idSoftware's Wolfenstein Enemy Territory this paper demonstrates that pre-probing a subset ...

Tópico(s): Distributed and Parallel Computing Systems

2008 - Springer Science+Business Media | Lecture notes in computer science

Artigo

Antonio Cricenti, Philip Branch, Grenville Armitage,

... Life 2 Counter-Strike, Quake III Arena and Wolfenstein Enemy Territory. For each of these games we analyse sessions ...

Tópico(s): Network Security and Intrusion Detection

2007 - Institute of Electrical and Electronics Engineers | ˜The œ... IEEE International Conference on Networks/˜The œIEEE International Conference on Networks

Artigo Acesso aberto Revisado por pares

Chad Habel,

... reference to another iconic first-person shooter franchise, Wolfenstein, which also originated in the 1980s and has ... video games.ReferencesBaker, Meguey. “Problematizing Power Fantasy.” The Enemy 1.2 (2015). 18 Feb. 2018 <http://theenemyreader. ...

Tópico(s): Sexuality, Behavior, and Technology

2018 - Queensland University of Technology | M/C Journal