Sciweavers

947 search results - page 104 / 190
» Information Security in Mobile Databases
Sort
View
129
Voted
WPES
2004
ACM
15 years 9 months ago
Privacy preserving route planning
The number of location-aware mobile devices has been rising for several years. As this trend continues, these devices may be able to use their location information to provide inte...
Keith B. Frikken, Mikhail J. Atallah
133
Voted
ICRA
2003
IEEE
156views Robotics» more  ICRA 2003»
15 years 9 months ago
TopBot: automated network topology detection with a mobile robot
Abstract— We have demonstrated that a properlyequipped mobile robot can easily construct a detailed map of the wireless coverage of an urban environment. The Autonomous Vehicle f...
Paul Blaer, Peter K. Allen
221
Voted
GIS
2003
ACM
16 years 4 months ago
Nearest neighbor queries in road networks
With wireless communications and geo-positioning being widely available, it becomes possible to offer new e-services that provide mobile users with information about other mobile ...
Christian S. Jensen, Jan Kolárvr, Torben Ba...
IJWIN
2006
119views more  IJWIN 2006»
15 years 3 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
IEEEARES
2009
IEEE
15 years 10 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...