Next Generation Massive Multiplayer Games in a Mobile Context

Total Page:16

File Type:pdf, Size:1020Kb

Next Generation Massive Multiplayer Games in a Mobile Context Freie Universität Berlin Fachbereich Informatik und Mathematik AG Technische Informatik Dipl. Inform. Dipl. Kaufm. Tobias Fritsch DOCTORAL DISSERTATION Dissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften im Fachbereich Mathematik und Informatik der Freien Universität Berlin Next Generation Massive Multiplayer Games in a Mobile Context Eingereicht bei: Prof. Dr.-Ing. Jochen Schiller Prof. Dr. Mark Claypool Dipl. Inform. Dipl. Kaufm. Tobias Fritsch Matr.-Nr. 3581795 Anschrift Angermünder Straße 1a 12305 Berlin Tel. 030 74682460 E-Mail [email protected] Ort/Datum Berlin, den 22.09.2007 Gutachter: Prof. Dr.-Ing. Jochen Schiller Prof. Dr. Ing. Knut Reinert Prof. Dr. Günter Rote Dr. Achim Liers Prüfungsdatum der letzten Prüfung: 29.05.2008 I Acknowledgements The work in this thesis presents the results of my scientific studies as a PhD student at the Freie Universität Berlin. Research was mainly conducted by the mobile gaming workgroup, which is a project of the Freie Universität Berlin’s computer science department. I would like to take this opportunity to thank everyone for supporting me during this time. First of all, I owe my deepest gratitude to Prof. Jochen Schiller, who was the primary adviser of this doctorial dissertation. His immense motivation always encouraged me to continue working unrelentlessly in order to achieve the scheduled tasks. By providing me with tremendous flexibility during my first three years, he further supported my inspiration and therefore significantly helped to complete this work. His knowledge of and insight into technical computer science is remarkable; he always managed to maintain an overview of the large scope of this work. Furthermore, I would like to thank Dr. Hartmut Ritter for acting as my second adviser. His profound knowledge and practical experience helped me understand my task as a PhD student much more clearly. His amazing ideas and motivation substantially modified my work and gave me insights into the scientific importance. I would also like to thank Benjamin Voigt for his inspiration over the last three years. I had the fortitude to have a friend who was consistently honest with me, hence giving me the clearest feedback to point out problematic fields. His support of and insight into the psychologically related fields of my research have been most valuable for me, thus I am very grateful. On par with that, I would also like to thank Peter Harmjanz for his loyal support. His thorough perusal and correction of my drafts ensured long-term high quality. Due to his immense insights into the gaming scene and player-oriented feedback, I was inspired and advised more than just once. Even with tight deadlines, he always found the time to help me with my research, hence he deserves my deepest regards. Finally, I would like to thank my mother for her unique and absolutely irreplaceable support during my education and my ongoing scientific work. Without her skill to coordinate and manage, her ability to encourage and motivate me, her strength and love, I would not be half the man that I am. Therefore, I would especially like to dedicate this work to her. II Abstract (English): Within the last few years, the importance of (multiplayer) computer games has experienced immense growth. On par with that, the size of persistent virtual environments (VEs) has also increased. Today, more than 120 MMOGs (Massive Multiplayer Online Games) ranging from FPS (first person shooter) to classic RPG (role playing game) settings exist. This illustrates the significant influence of the growing number of simultaneously playing users. The way that games are played has also evolved. Not only has the community and variety of gaming grown in numbers; but the way games are understood has changed fundamentally, too. In fact, terms like “hardcore” (a behaviour regarding the game; describes a far above average interest in the game content and a strong motivation to achieve) and “casual” (attempts to play the game with below average interest) have become well known in the player scene. Hence, player behaviour is one of the most valuable influencing factors. Furthermore, the importance of mobile games has increased rapidly as well, leaving no doubt that the current game evolution aims for more flexibility towards locations. Thus, new problematic fields in the mobile sector are arising, especially with regard to real-time applications. This dissertation will focus on the current game evolution and pinpoint the most important related approaches. It will subsequently introduce certain techniques to improve aspects of each of the most significant influencing factors: massive multiplayer, mobile gaming and player behaviour. The first research approach aims to understand the underlying player preferences in order to create better software solutions. As a part of this, the effects of virtual fragmentation (difference between real world and virtual world behaviour) and game time distribution will then be evaluated and statistically analyzed. The second approach aims to improve the mobile gaming performance by analyzing limitations in input and display of current mobile devices. By using a software solution, the matching time for players is improved drastically and by integrating mobile support for instant messengers, each user can also communicate with in-game friends who play common Internet games. The third approach introduces a middleware solution to support MMOG games. By designing a message-based structure and creating a generic application, it can be expanded for the upcoming next generation MMOGs. III Abstract (German): In den letzten Jahren gewann die Wichtigkeit von (Multiplayer) Computerspielen zunehmend an Bedeutung. Zusammen damit vergrößerten sich die virtuelle Umgebungen (VEs). Heute existieren mehr als 120 verschiedene MMOGs (Massive Multiplayer Online Games), die von FPS (first person shooter) bis hin zu klassischen RPG (role playing game) Settings reichen. Diese Entwicklung illustriert den signifikanten Einfluss der zunehmenden Anzahl an (gleichzeitig) spielenden Nutzern. Des weiteren hat sich die Art Spiele zu spielen weiter entwickelt. Nicht nur die Anzahl der Spieler und die Vielfalt der Spiele hat zugenommen; vielmehr hat sich die Art Computerspiele zu begreifen fundamental verändert. Tatsächlich sind Termini, wie „hardcore“ und „casual“ in der Spielerszene sehr bekannt geworden. Deshalb ist das Spielerverhalten einer der wertvollsten Einflussfaktoren. Außerdem hat sich die Wichtigkeit von mobilen Spielen rapide entwickelt und lässt keinen Zweifel offen, dass die aktuelle Entwicklung klar auf höhere Flexibilität seitens der physischen Orte setzt. Dem entsprechend entstehen neue Problemfelder im mobilen Kontext, besonders in Verbindung mit zeitkritischen Applikationen. Diese Dissertation fokussiert sich auf die derzeitige Spieleentwicklung und zeigt die wichtigsten verwandten Themenansätze auf. Darauf folgend werden verschiedene Techniken vorgestellt, um Aspekte der wichtigen Einflussfaktoren zu verbessern: Massive Multiplayer, Mobile Gaming und Spielerverhalten. Der erste Ansatz beinhaltet eine Evaluation von Spielerverhalten, um die Erstellung effektiverer Software zu ermöglichen. Besonderer Fokus liegt hierbei auf dem Effekt der vitual fragementation (Unterschied zwischen realem und virtuellem Verhalten) und der Gesamtspielzeit, die beide statistisch analysiert werden. Der zweite Ansatz zielt auf mobile Spiele ab, deren Eingabe- und Darstellungslimitationen evaluiert werden. Mit einer Softwarelösung in Form einer mobilen Lobby entsteht die Möglichkeit die Spielevermittlungszeit drastisch zu senken. Des weiteren ermöglicht die Integration von Instant Messengern für mobile Endgeräte die Kommunikation mit Spielern aus klassischen Internetspielen. Der dritte Ansatz beinhaltet eine Middleware Applikation, um speziell MMOGs zu unterstützen, durch das nachrichtenbasierte Design ermöglicht dies sowohl Skallierbarkeit als auch Integration für künftige MMOGs. IV Table of Contents Page 1. Introduction........................................................................................1 1.1 Problem Statement ...................................................................4 1.2 Scientific Contribution .............................................................7 1.3 Thesis Overview ......................................................................11 2. Background........................................................................................13 2.1 Game Evolution .......................................................................13 2.1.1 In-Game Communication..................................................18 2.1.2 Technical Realization........................................................19 2.2 Mobile Gaming ........................................................................22 2.3 Massive Online Gaming...........................................................25 2.4 Player Behaviour in Online Games ..........................................31 2.5 Summary..................................................................................35 3. Related Work .....................................................................................36 3.1 Definition of the Assessment Parameters .................................36 3.2 Mobile Aware Games...............................................................38 3.2.1 Asynchronous Mobile Gaming .........................................40 3.2.2 Near-Field-Areas and Mobile Games................................42
Recommended publications
  • User's Guide to Aolpress
    User’s Guide to AOLpress 2.0 Do-it-Yourself Publishing for the Web 1997 America Online, Inc. AOL20-040797 Information in this document is subject to change without notice. Both real and fictitious companies, names, addresses, and data are used in examples herein. No part of this document may be reproduced without express written permission of America Online, Inc. 1997 America Online, Inc. All rights reserved. America Online is a registered trademark and AOLpress, AOLserver, PrimeHost, AOL, the AOL triangle logo, My Place, Netizens, and WebCrawler are trademarks of America Online, Inc. GNN is a registered trademark, and Global Network Navigator, GNNpress, and GNNserver are trademarks of Global Network Navigator, Inc. MiniWeb, NaviLink, NaviPress, NaviServer, and NaviService are trademarks of NaviSoft, Inc. Illustra is a trademark of Illustra Information Technologies, Inc. All other brand or product names are trademarks or registered trademarks of their respective companies or organizations. Author: Yvonne DeGraw Cover Art and Illustrations: Amy Luwis Special Thanks To: Thomas Storm, Cathe Gordon, Angela Howard, George W. Williams, V, Dave Long, Dave Bourgeois, Joel Thames, Natalee Press-Schaefer, Robin Balston, Linda T. Dozier, Jeff Dozier, Doug McKee, and Jeff Rawlings. Quick Table of Contents Contents Part 1: Getting Started Welcome! 11 Chapter 1 Installing AOLpress 17 Chapter 2 Create a Web Page in 10 Easy Steps 21 Chapter 3 Browsing with AOLpress 33 Part 2: Creating Pages Chapter 4 Web Pages and What to Put in Them 45 Chapter 5 Creating
    [Show full text]
  • Jdjedge Conference & Expo Final Program Inside P.91
    JDJEDGE CONFERENCE & EXPO FINAL PROGRAM INSIDE P.91 TM Java COM FINAL CONFERENCE PROGRAM INSIDE PAGE 91 Q&A: An Interview with Jason Hunter Alan Williamson 9 From the Editor Open sourcing Java – what it means to developers Alan Williamson pg. 7 Interfaces: Combining RMI with SOAP Samudra Gupta J2EE Editorial Develop a framework that SOAP-enables RMI services 16 Ajit Sagar pg. 12 J2SE Editorial Feature: Spread Your Wings with Cocoon David Rosenstrauch Keith Brown pg. 42 An innovative and powerful tool for content site developers 28 J2ME Editorial Java Systems: Broken Windows in the Java World Joe Xu Jason R. Briggs pg. 66 The Java bug’s evil twin and how it impacts your system 44 Career Opportunities Bill Baloglu & Billy Palmieri JNI Techniques: Using the Java Native Andrew J. Chalk pg. 112 Interface Productively Simplify repetitive tasks 58 Cubist Threads Blair Wyman pg. 114 Wireless Music:Whole House Audio from Bill Ray RETAILERS PLEASE DISPLAY the Palm of Your Hand It’s only the beginning 68 UNTIL AUGUST 31, 2002 Feature: Adding Commands to Fred Daoud Displayable Components ...the object-oriented way 74 MIDP: Programming Games in J2ME Sami Lababidi The battle for market share in the MIDP games arena 86 SYS -CON Michael Barlotta MEDIA Java Techniques: Java Design Using interfaces and abstract classes to create flexible code 94 Sonic Software Zero G www.sonicsoftware.com www.zerog.com 2 JUNE 2002 JUNE 2002 3 Java COM Java COM Apple Apple Computer, Inc. Computer, Inc. www.apple.com/macosx www.apple.com/macosx 4 JUNE 2002 JUNE 2002 5 Java COM Java COM FROMF THE EDITORDI J2ME INTERNATIONAL ADVISORY BOARD • CALVIN AUSTIN (Lead Software Engineer, J2SE Linux Project, Sun Microsystems), • JAMES DUNCAN DAVIDSON (JavaServlet API/XMP API, Sun Microsystems), • JASON HUNTER (Senior Technologist, CollabNet), • JON S.
    [Show full text]
  • Instant Messaging Security
    www.dbebooks.com - Free Books & magazines Instant Messaging Security Computer Security and Computer Forensic Related Book Titles: Casey, Handbook of Computer Crime Investigation, ISBN 0-12-163103-6, 448pp, 2002. Kovacich, The Information Systems Security Officer’s Guide, ISBN 0-7506-7656-6, 361pp, 2003. Boyce & Jennings, Information Assurance, ISBN 0-7506-7327-3, 261pp, 2002. Stefanek, Information Security Best Practices: 205 Basic Rules, ISBN 0-878707-96-5, 194pp, 2002. De Clercq, Windows Server 2003 Security Infrastructures: Core Security Features, ISBN 1-55558-283-4, 752pp, 2004. Rittinghouse, Wireless Operational Security, ISBN 1-55558-317-2, 496pp, 2004. Rittinghouse & Hancock, Cybersecurity Operations Handbook, ISBN 1-55558-306-7, 1336pp, 2003. Ransome & Rittinghouse, VoIP Security, ISBN 1-55558-332-6, 450pp, 2005. Speed & Ellis, Internet Security, ISBN 1-55558-298-2, 398pp, 2003. Erbschloe, Implementing Homeland Security for Enterprise IT, ISBN 1-55558-312-1, 320pp, 2003. Erbschloe, Physical Security for IT, ISBN 1-55558-327-X, 320pp, 2005. XYPRO, HP NonStop Server Security, ISBN 1-55558-314-8, 618pp, 2003. For more information, visit us on the Web at http://books.elseiver.com/. Computer Security and Computer Forensic Related Products: Newsletters and Journals from Elsevier: Digital Investigation – New in 2004 Edited by Eoghan Casey, this new peer reviewed journal focuses on best practice, new developments and proven methodologies in the field of digital forensic science. For further information, please visit: http://www.compseconline.com/digitalinvestigation/ • Biometric Technology Today • Card Technology Today • Computer Fraud & Security • Computer Law and Security Report • Computers & Security • Information Security Technical Report • Network Security • Infosecurity Today For more information, visit us on the Web at http://www.compseconline.com/.
    [Show full text]
  • Webdav a Network Protocol for Remote Collaborative Authoring on the Web E
    WebDAV A network protocol for remote collaborative authoring on the Web E. James Whitehead, Jr.† & Yaron Y. Goland‡ †Dept. of Info. and Computer Science, U.C. Irvine, USA, [email protected] ‡Microsoft Corporation, Redmond, WA, USA, [email protected] Abstract. Collaborative authoring tools generate network effects, where each tool’s value depends not just on the tool itself, but on the number of other people who also have compatible tools. We hypothesize that the best way to generate network effects and to add collaborative authoring capability to existing tools is to focus on the network protocol. This paper explores a protocol-centric approach to collaborative authoring by examining the requirements and functionality of the WebDAV protocol. Key features of the protocol are non- connection-oriented concurrency control, providing an upward migration path for existing non-collaborative applications, support for remote manipulation of the namespace of documents, and simultaneous satisfaction of a wide range of functional requirements. Introduction Despite many compelling research examples of collaborative authoring, so far their impact on actual authoring practice has been limited. While BSCW (Bentley et al., 1997) and HYPER-G (Maurer, 1996) have developed communities of use, electronic mail remains the dominant technology used for collaborative authoring, mainly due to its ubiquity. In order to perform collaborative authoring, all collaborators need to use compatible authoring tools—typically all collaborators use the same tools, tailor- made to support collaboration. To collaborate using PREP (Neuwirth et al., 1994), all collaborators need to use PREP, likewise for GROVE (Ellis et al., 1989) and DUPLEX (Pacull et al., 1994).
    [Show full text]
  • Malicious Threats and Vulnerabilities in Instant Messaging
    WHITE PAPER Symantec Security Response Malicious Threats and Vulnerabilities in Instant Messaging By Neal Hindocha and Eric Chien Symantec Security Response Symantec Corporation INSIDE INSIDE∆ Instant Messaging Architecture ∆ Malicious Threats to Instant Messaging ∆ Vulnerabilities and Blended Threats ∆ Information Disclosure Originally published in Virus Bulletin International Conference, September 2003. Copyright held by Virus Bulletin, Ltd., but is made available free of charge by ∆ Password Theft permission of Virus Bulletin. For more information on Virus Bulletin, ∆ Current and Future Solutions please visit http://virusbtn.com/ Symantec MALICIOUS THREATS AND VULNERABILITIES IN INSTANT MESSAGING Contents Abstract & Preface . .3 Instant Messaging Architecture . 4 User Verification . 5 Data Encryption and Authentication . 6 Enterprise Editions . 6 Programmability . 6 Malicious Threats to Instant Messaging . 7 Backdoor Trojan Horses . 10 Vulnerabilities and Blended Threats . 10 Information Disclosure . .14 Password Theft . 16 Current and Future Solutions . 18 Antivirus . 20 Summary . 21 References . 22 About the Authors . 23 Symantec MALICIOUS THREATS AND VULNERABILITIES IN INSTANT MESSAGING √ Abstract Instant messaging is an up and coming threat as a carrier for malware. More and more people are using instant messaging, both for personal and business reasons. Instant messaging networks provide the ability to not only transfer text messages, but also transfer files. Consequently, instant messengers can transfer worms and other malware. Furthermore, multiple vulnerabilities have been discovered and have yet to be discovered in instant messaging clients. Such vulnerabilities not only give hackers remote access, but also provide access to fast spreading blended threats. Current blended threats are limited by their ability to find vulnerable hosts, but with instant messaging buddy lists, finding vulnerable hosts becomes significantly easier resulting in a blended threat that may propagate faster than CodeRed and Slammer.
    [Show full text]
  • An Analysis of Instant Messaging and E- Mail Access Protocol Behavior in Wireless Environment
    An Analysis of Instant Messaging and E- mail Access Protocol Behavior in Wireless Environment IIP Mixture Project Simone Leggio Tuomas Kulve Oriana Riva Jarno Saarto Markku Kojo March 26, 2004 University of Helsinki - Department of Computer Science i TABLE OF CONTENTS 1 Introduction ..................................................................................................................................... 1 PART I: BACKGROUND AND PROTOCOL ANALYSIS ............................................................. 1 2 Instant Messaging............................................................................................................................ 1 3 ICQ.................................................................................................................................................. 3 3.1 Overview ................................................................................................................................. 3 3.2 Protocol Operation .................................................................................................................. 4 3.2.1 Client to Server................................................................................................................4 3.2.2 Client to Client ................................................................................................................5 3.2.3 Normal Operation............................................................................................................ 5 3.2.4 Abnormal Operation.......................................................................................................
    [Show full text]
  • Messing with the Magic PART TWO - the Google Story
    Table of Contents Title Page Copyright Page Dedication PREFACE PART ONE - Different Planets CHAPTER ONE - Messing with the Magic PART TWO - The Google Story CHAPTER TWO - Starting in a Garage CHAPTER THREE - Buzz but Few Dollars CHAPTER FOUR - Prepping the Google Rocket CHAPTER FIVE - Innocence or Arrogance? CHAPTER SIX - Google Goes Public CHAPTER SEVEN - The New Evil Empire? PART THREE - Google Versus the Bears CHAPTER EIGHT - Chasing the Fox CHAPTER NINE - War on Multiple Fronts CHAPTER TEN - Waking the Government Bear CHAPTER ELEVEN - Google Enters Adolescence CHAPTER TWELVE - Is "Old" Media Drowning? CHAPTER THIRTEEN - Compete or Collaborate? CHAPTER FOURTEEN - Happy Birthday PART FOUR - Googled CHAPTER FIFTEEN - Googled CHAPTER SIXTEEN - Where Is the Wave Taking Old Media? CHAPTER SEVENTEEN - Where Is the Wave Taking Google? Acknowledgements NOTES INDEX ALSO BY KEN AULETTA Media Man: Ted Turner's Improbable Empire Backstory: Inside the Business of News World War 3.0: Microsoft and Its Enemies The Higbwaymen: Warriors of the Information Superhighway Three Blind Mice: How the TV Networks Lost Their Way Greed and Glory on Wall Street: The Fall of the House of Lehman The Art of Corporate Success: The Story of Schlumberger The Underclass Hard Feelings The Streets Were Paved with Gold THE PENGUIN PRESS Published by the Penguin Group Penguin Group (USA) Inc., 375 Hudson Street, New York, New York 10014, U.S.A. Penguin Group (Canada), 90 Eglinton Avenue East, Suite 700, Toronto, Ontario, Canada M4P 2Y3 (a division of Pearson Penguin Canada Inc.). Penguin Books Ltd, 80 Strand, London WC2R ORL, England. Penguin Ireland, 25 St. Stephen's Green, Dublin 2, Ireland (a division of Penguin Books Ltd).
    [Show full text]
  • Copyrighted Material
    27_597582_bindex.qxd 8/5/05 10:15 PM Page 585 Index NUMERICS AmazonSearchScraper class, 405–406 0.3 specification, Atom, 39, 211 AmazonWishlistScraper class, 409–411 1.0 specification, RSS, 39 America Online Instant Messenger. See AIM (AOL 2.0 specification, RSS, 39 Instant Messenger) 4Suite package, 20–21, 433 AmphetaDesk feed aggregator, 8 AmphetaRate service, 481 A AOL Instant Messenger. See AIM “A Plan for Spam” (Graham), 451 Apache Web server access logs, Apache, 304–312 compression, enabling, 231–232 ACCESS_LOG constant, 305 conditional GET, enabling, 235–236 ACCESS_RE constant, 310 configuring MIME types for feeds, 25 Active Channels, Internet Explorer, 4 monitoring access logs, 304–312 addConnection() method, 117–118 monitoring error logs, 301–304 addTrack() method, 192 API_BLOGID constant, 525 AddType configuration, Apache, 25 API_PASSWD constant, 525 AdiumX IM client, 105 API_URL constant, 525 Advanced Packaging Tool, Debian Linux, 18 API_USER constant, 525 agg01_pollsubs.py program, 52–59 append_entry() method, 297–298 agg01_subscribe.py program, 50–51 AppleScript agg02_pollsubs.py program, 68–77 accessing from Python, 160 agg03_emailsubs.py program, 80–86 importing MP3s into iTunes, 189–194 agg04_emailsubs.py program, 86–91 application ID, Yahoo! Web services, 384–385, 387 agg05_im_subs.py program, 105–111 ARCHIVE_FN constant, 517 agg06_aggbot.py program, 114–124 ASSOCIATE_TAG constant, 508–509 AggBot class, 116–124 “ATOM 0.3” links, 23 agglib.py module, 77–79, 112–114, 145–146 Atom feeds. See also feeds aggregator. See feed
    [Show full text]
  • Comparison of Different Ways to Avoid Internet Traffic Int…
    José López Luque Comparison of Different Ways to Avoid Internet Traffic Interception Trondheim, September 2010 Comparison of Different Ways to Avoid Internet Traffic Interception José López Luque Master’s thesis Submission date: September 2010 Professor: Stig F. Mjølsnes Supervisor: Svein Y. Willassen Norwegian University of Science and Technology Department of Telematic Engineering Problem Description The main objective of this thesis is to analyze and compare different ways to avoid the Internet traffic eavesdropping by the governments (we have the Swedish example with the FRA-Law, but is also extensible to other countries, like China). It will begin with a general overview of the countries involved, their interception laws, the main reasons that motivated these laws and their social implications. The further analysis will consist on a description of the technologies involved in each option as well as the difficulties to implement them and the technical knowledge of the users in order to take profit of them. Assignment given: 27. January 2010 Professor: Stig F. Mjølsnes To my family, with love Abstract As telephone conversations have moved to the Internet, so have those who want to listen in. But the technology needed to do so would entail a dangerous expansion of the government's surveillance powers. Internet users are watching how their privacy is slowly being undermined with justifications of national security and anti-terrorist purposes. This surveillance is justified or not, users must know what options are available to them to protect their privacy. The main objective of this thesis is to analyze and compare different ways to avoid the Internet traffic eavesdropping (carried out both by governments or malicious particulars).
    [Show full text]
  • Instant Paranoia Konstantin Klyagin
    Instant Paranoia Konstantin Klyagin English version of an article published in "Hakin9" Magazine issue 3/2004 All rights reserved. You are allowed to distribute this document pending no modification is made to its contents. “Hakin9” Magazine, Wydawnictwo Software, ul. Lewartowskiego 6, 00-190 Warszawa, [email protected] Instant Messenger security Instant Paranoia Konstantin Klyagin Talking every day on your favorite instant messaging networks with friends, lovers, colleagues and partners, have you ever thought if your conversations can be intercepted and become exposed to someone who can use them with some evil intentions? here are many instant messaging existing protocols. There are messages sent systems with different features and through the server (client -> server -> client), Tcapabilities. Their security properties and those that are sent directly (client -> client, are also different and it’s obvious that one are also known as peer to peer). Peer to peer is more secure than others. We’ll take a look at quite a common way of direct communications the major players on the IM market, see what between two clients, though it is not supported vulnerabilities they have and using which of in all of IM systems. These are used when one of them you must be the most paranoid. the clients can connect to another one, knowing their IP address. Due to specific network setup Basics or a firewall such connections are possible not Imagine you came back from your job, sit down to reach the destination. In this case, fallback to comfortably at your computer and open your the through-server scheme is usually made.
    [Show full text]
  • Defining a Software Analysis Framework
    School of Mathematics and Systems Engineering Reports from MSI - Rapporter från MSI Defining a Software Analysis Framework Oguzhan Dogan MSI Report 08079 Aug Växjö University ISSN 1650-2647 2008 SE-351 95 VÄXJÖ ISRN VXU/MSI/DA/E/--08079/--SE Acknowledgement Thanks to… ... Professor Welf Löwe and other developers of VizzAnalyzer, … Mathias Hedenborg for his lectures, …Rudiger Lincke for his lectures and providing me with inspiring notes and interesting new ideas for my project, ... Jesper Andersson for his lectures, ...My good class mates who attended the same course with me. Växjö, May 2008 i Abstract Nowadays, assessing software quality and making predictions about the software are not possible. Software metrics are useful tools for assessing software quality and for making predictions. But currently the interpretation of the measured values is based on personal experience. In order to be able to assess software quality, quantitative data has to be obtained. VizzAnalyzer is a program for analyzing open source Java Projects. It can be used for collecting quantitative data for defining thresholds that can support the interpretation of the measurement values. It helps to assess software quality by calculating over 20 different software metrics. I define a process for obtaining, storing and maintaining software projects. I have used the defined process to analyze 60-80 software projects delivering a large database with quantitative data. Keywords: SourceForge.NET, Software Metrics, VizzAnalyzer. ii Table of Contents 1.Introduction....................................................................................................................1
    [Show full text]