Author of the publication

Group play: determining factors on the gaming experience in multiplayer role-playing games.

, , , , and . Comput. Entertain., 5 (4): 10:1-10:29 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the Design of a Trust Management Framework for the Internet of Things., , and . ICST, page 1-7. IEEE, (2019)Predicting player churn in destiny: A Hidden Markov models approach to predicting player departure in a major online game., , , , , and . CIG, page 1-8. IEEE, (2016)Security services and public key infrastructure for ATM networks., , and . LCN, page 253-262. IEEE Computer Society, (1997)Evaluating the Impact of the Human-Agent Teamwork Communication Model (HAT-CoM) on the Development of a Shared Mental Model., , and . PRIMA, volume 8291 of Lecture Notes in Computer Science, page 453-460. Springer, (2013)Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems., , and . TrustCom, page 714-721. IEEE Computer Society, (2012)Trust and authorization in the grid: a recommendation model., , , and . ICPS, page 433-436. IEEE Computer Society, (2005)VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable Interactions., , , and . ICCCN, page 1-7. IEEE, (2022)A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control., , and . ICETE (Selected Papers), volume 456 of Communications in Computer and Information Science, page 226-251. Springer, (2013)Security Policy Management in Distributed Systems., , and . IASTED PDCS, page 290-294. IASTED/ACTA Press, (2002)Policy Administration Domains., , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 286-302. Springer, (2002)