Sciweavers

429 search results - page 54 / 86
» Group Routing without Group Routing Tables
Sort
View
TPDS
2008
231views more  TPDS 2008»
13 years 8 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
IPL
2000
105views more  IPL 2000»
13 years 8 months ago
Coverings that preserve sense of direction
Sense of direction is a property of labelled networks (i.e., arc-coloured graphs) that allows one to assign coherently local identifiers to other processors on the basis of the ro...
Paolo Boldi, Sebastiano Vigna
ISI
2006
Springer
13 years 8 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
JPDC
2006
133views more  JPDC 2006»
13 years 8 months ago
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...
GIS
2006
ACM
13 years 8 months ago
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desir...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu