In this paper, we propose a novel approach to expand queries by exploring both location information and topic information of the queries. Users at different locations tend to have...
Shu Huang, Qiankun Zhao, Prasenjit Mitra, C. Lee G...
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
The preferred method of treatment for Atrial Fibrillation (AF) is by catheter ablation wherein a catheter is guided into the left atrium through a transseptal puncture. However, th...
Jagadeesan Jayender, Rajni V. Patel, Gregory F. ...
Location based services are becoming essential feature of context-awareness in ubiquitous computing. Reflective distribute component programming model is proposed to systematicall...