{"id":"https://openalex.org/W7127053042","doi":"https://doi.org/10.1145/3784833.3784875","title":"Hybrid Network Architecture for Low-Latency and Secure Digital Game Development","display_name":"Hybrid Network Architecture for Low-Latency and Secure Digital Game Development","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W7127053042","doi":"https://doi.org/10.1145/3784833.3784875"},"language":null,"primary_location":{"id":"doi:10.1145/3784833.3784875","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3784833.3784875","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 11th International Conference on Communication and Information Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124709206","display_name":"Ying Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":true,"raw_author_name":"Ying Chen","raw_affiliation_strings":["School of Graduate Studies, Mapua University, Manila, Philippines"],"affiliations":[{"raw_affiliation_string":"School of Graduate Studies, Mapua University, Manila, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124701401","display_name":"William P. Rey","orcid":null},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"William P. Rey","raw_affiliation_strings":["School of Graduate Studies, Mapua University, Manila, Philippines"],"affiliations":[{"raw_affiliation_string":"School of Graduate Studies, Mapua University, Manila, Philippines","institution_ids":["https://openalex.org/I137967721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5124709206"],"corresponding_institution_ids":["https://openalex.org/I137967721"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.75386925,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"297","last_page":"303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.16740000247955322,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.16740000247955322,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.1550000011920929,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0917000025510788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.45969998836517334},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4519999921321869},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.43619999289512634},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4239000082015991},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4122999906539917},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.3700000047683716},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.33009999990463257}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6491000056266785},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.482699990272522},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.45969998836517334},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4519999921321869},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.43619999289512634},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4239000082015991},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4122999906539917},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.3700000047683716},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3562999963760376},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.33009999990463257},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.2946000099182129},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29350000619888306},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2696000039577484},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.2597000002861023},{"id":"https://openalex.org/C62793504","wikidata":"https://www.wikidata.org/wiki/Q228327","display_name":"Access network","level":2,"score":0.25679999589920044},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.2535000145435333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3784833.3784875","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3784833.3784875","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 11th International Conference on Communication and Information Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6246380805969238,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2045287414","https://openalex.org/W2080346852","https://openalex.org/W2101963262","https://openalex.org/W2138451337","https://openalex.org/W2147805706","https://openalex.org/W2164598857","https://openalex.org/W2195423816","https://openalex.org/W2570343428","https://openalex.org/W2902219846","https://openalex.org/W2962912109","https://openalex.org/W3151172299","https://openalex.org/W3153008253","https://openalex.org/W3172680569","https://openalex.org/W3205153195","https://openalex.org/W3212941463","https://openalex.org/W4210697956","https://openalex.org/W4211092666","https://openalex.org/W4281801793","https://openalex.org/W4301392153","https://openalex.org/W4387933382","https://openalex.org/W4403946584","https://openalex.org/W4405812550","https://openalex.org/W4409316135"],"related_works":[],"abstract_inverted_index":{"This":[0,161],"paper":[1,119],"explores":[2,139],"the":[3,14,59,67,94,135],"design":[4],"and":[5,41,48,80,87,109,129,148,177],"implementation":[6],"of":[7,16,69,104],"a":[8,19,43,157,165,169],"hybrid":[9,170],"network":[10,30,64,171],"architecture":[11,91,172],"tailored":[12],"to":[13,28,56,73,114,153],"needs":[15],"PixelForge":[17,180],"Studios,":[18],"digital":[20],"game":[21,76,158],"development":[22,159],"studio.":[23],"The":[24,90,118],"primary":[25],"objective":[26],"is":[27],"optimize":[29],"performance":[31],"for":[32,36,46,97,106,168,187],"ultra-low":[33],"latency,":[34],"crucial":[35],"enabling":[37,101],"seamless":[38],"global":[39],"playtesting":[40],"ensuring":[42],"responsive":[44],"experience":[45],"developers":[47],"testers":[49],"distributed":[50],"across":[51],"different":[52],"locations.":[53],"In":[54],"addition":[55],"latency":[57,121],"optimization,":[58,126],"study":[60],"focuses":[61],"on":[62],"enhancing":[63],"security":[65,71,140],"through":[66],"integration":[68],"advanced":[70,130],"protocols":[72],"protect":[74],"sensitive":[75],"assets,":[77],"source":[78],"code,":[79],"proprietary":[81],"information":[82],"from":[83],"potential":[84],"cyber":[85],"threats":[86],"unauthorized":[88],"access.":[89],"also":[92],"addresses":[93],"studio\u2019s":[95],"need":[96],"scalable":[98],"cloud":[99],"integration,":[100],"dynamic":[102],"allocation":[103],"resources":[105],"rendering,":[107],"storage,":[108],"collaborative":[110],"development,":[111],"thereby":[112],"adapting":[113],"fluctuating":[115],"project":[116],"requirements.":[117],"analyzes":[120],"optimization":[122],"strategies,":[123],"including":[124],"CDN":[125],"edge":[127],"computing,":[128],"traffic":[131],"management":[132],"protocols.":[133],"At":[134],"same":[136],"time,":[137],"it":[138],"measures":[141],"such":[142],"as":[143],"encryption,":[144],"intrusion":[145],"detection":[146],"systems,":[147],"multi-factor":[149],"authentication,":[150],"specifically":[151],"designed":[152],"address":[154],"vulnerabilities":[155],"in":[156,164],"environment.":[160],"research":[162],"culminates":[163],"detailed":[166],"proposal":[167],"that":[173],"balances":[174],"performance,":[175],"security,":[176],"scalability,":[178],"providing":[179],"Studios":[181],"with":[182],"an":[183],"efficient,":[184],"robust":[185],"infrastructure":[186],"creating":[188],"next-generation":[189],"gaming":[190],"experiences.":[191]},"counts_by_year":[],"updated_date":"2026-02-06T02:01:19.302388","created_date":"2026-02-03T00:00:00"}
