Sciweavers

485 search results - page 57 / 97
» Continuous Spatial Authentication
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 4 months ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
SIGMOD
2010
ACM
267views Database» more  SIGMOD 2010»
14 years 16 days ago
Processing proximity relations in road networks
Applications ranging from location-based services to multi-player online gaming require continuous query support to monitor, track, and detect events of interest among sets of mov...
Zhengdao Xu, Hans-Arno Jacobsen
CIDR
2007
141views Algorithms» more  CIDR 2007»
13 years 9 months ago
Data-Driven Processing in Sensor Networks
Wireless sensor networks are poised to enable continuous data collection on unprecedented scales, in terms of area location and size, and frequency. This is a great boon to field...
Adam Silberstein, Gregory Filpus, Kamesh Munagala,...
ICDCS
2012
IEEE
11 years 10 months ago
NEAT: Road Network Aware Trajectory Clustering
—Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean di...
Binh Han, Ling Liu, Edward Omiecinski
VLDB
2006
ACM
490views Database» more  VLDB 2006»
15 years 7 months ago
The New Casper: Query Processing for Location Services without Compromising Privacy
This paper tackles a major privacy concern in current location-based services where users have to continuously report their locations to the database server in order to obtain the ...
Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref