Sciweavers

947 search results - page 113 / 190
» Information Security in Mobile Databases
Sort
View
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
15 years 9 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
122
Voted
SSD
2005
Springer
150views Database» more  SSD 2005»
15 years 9 months ago
Opportunistic Data Dissemination in Mobile Peer-to-Peer Networks
In this paper we examine the dissemination of availability reports about resources in mobile peer-to-peer networks, where moving objects communicate with each other via short-range...
A. Prasad Sistla, Ouri Wolfson, Bo Xu
164
Voted
WIMOB
2008
IEEE
15 years 10 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao
FPGA
2008
ACM
623views FPGA» more  FPGA 2008»
15 years 5 months ago
From the bitstream to the netlist
We present an in-depth analysis of the Xilinx bitstream format. The information gathered in this paper allows bitstream compilation and decompilation. While not actually compromis...
Jean-Baptiste Note, Éric Rannaud
GIS
2009
ACM
15 years 10 months ago
Constrained reverse nearest neighbor search on mobile objects
In this paper, we formalize the novel concept of Constrained Reverse k-Nearest Neighbor (CRkNN) search on mobile objects (clients) performed at a central server. The CRkNN query c...
Tobias Emrich, Hans-Peter Kriegel, Peer Kröge...