Sciweavers

417 search results - page 52 / 84
» Experimental Evaluation of Memory Management in Content-Cent...
Sort
View
GIS
2009
ACM
14 years 8 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
APSCC
2008
IEEE
14 years 2 months ago
Algorithms for Transmission Power Control in Biomedical Wireless Sensor Networks
—Wireless sensor networks are increasingly being used for continuous monitoring of patients with chronic health conditions such as diabetes and heart problems. As biomedical sens...
Ashay Dhamdhere, Vijay Sivaraman, Vidit Mathur, Sh...
SSD
2009
Springer
180views Database» more  SSD 2009»
14 years 2 months ago
Indexing Moving Objects Using Short-Lived Throwaway Indexes
With the exponential growth of moving objects data to the Gigabyte range, it has become critical to develop effective techniques for indexing, updating, and querying these massive ...
Jens Dittrich, Lukas Blunschi, Marcos Antonio Vaz ...
KDD
2009
ACM
174views Data Mining» more  KDD 2009»
14 years 8 months ago
Audience selection for on-line brand advertising: privacy-friendly social network targeting
This paper describes and evaluates privacy-friendly methods for extracting quasi-social networks from browser behavior on user-generated content sites, for the purpose of finding ...
Foster J. Provost, Brian Dalessandro, Rod Hook, Xi...
ASPLOS
2011
ACM
12 years 11 months ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...