Sciweavers

174 search results - page 23 / 35
» Anonymous Mobility Management for Third Generation Mobile Ne...
Sort
View
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 7 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
GIS
2009
ACM
14 years 8 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
INFOCOM
1996
IEEE
13 years 11 months ago
Intelligent Agents: An Emerging Technology for Next Generation Telecommunications?
The telecommunications environment is changing its face towards an open market of information services where the vision is "information any time, at any place, in any form&qu...
Thomas Magedanz, Kurt Rothermel, Sven Krause
SUTC
2008
IEEE
14 years 2 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
CAISE
2003
Springer
14 years 26 days ago
A Portal for Ubiquitous Collaboration
This paper presents a software framework, called Collaborator, to provide a shared work-space supporting the activities of virtual teams. This system exploits seamless integration ...
Federico Bergenti, Socrates Costicoglou, Agostino ...