The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2011 vol.13)
pp: 6-8
Phillip A. Laplante , Pennsylvania State University
<p>Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good (such as solving large resource allocation problems or finding improvised explosive devices) or for evil (to allow criminals to gain unauthorized access to a system or break encryption algorithms). Surreptitious processing networks differ from botnets in that no rouge processing elements are present on the user side; instead, the computational payload is outsourced to humans who unknowingly provide partial solutions as they play the game. This approach makes the solution of large computational problems and the recruitment and exploitation of participants easy. This department is part of a special issue on social networking.</p>
Keywords: Gameplay, social networks, surreptitious problem solving, NP-hard problems, NP-complete problems, crowdsourcing, information technology
Phillip A. Laplante, "Ender Wiggin Played Mafia Wars Too", IT Professional, vol.13, no. 4, pp. 6-8, July/August 2011, doi:10.1109/MITP.2011.60
1. D. Goodin, "PlayStation Network Credit Cards Protected by Encryption," The Register,28 Apr. 2011; .
2. O.S. Card, Ender's Game, Tom Doherty Associates, 1985.
3. D. Goodin, "Boffins Bust Web Authentication with Game Consoles," The Register,30 Dec. 2008; .
4. J. Leyden, "Virtual! Stripper! Game! Targets! Yahoo!" The Register, 31 Oct. 2007; .
5. J.G. Davis, "From Crowdsourcing to Crowdservicing," IEEE Internet Computing, May/June 2011, pp. 92–94.
6. C. Mack, "Top 25 Facebook Games for February 2011," Inside Facebook,1 Feb. 2011; .
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool