Sciweavers

947 search results - page 141 / 190
» Information Security in Mobile Databases
Sort
View
GIS
2006
ACM
13 years 11 months ago
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desir...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
ICDE
2007
IEEE
121views Database» more  ICDE 2007»
14 years 5 months ago
Dispatching Hospitals Intelligently: A Service-Oriented Approach
Emergencies happen frequently and handling them effectively is necessary. In many cases, emergencies are treated by a static procedure, without considering the requirements of th...
Oguz Akgus, Serdar Torgan, Anil Gürsel, Emre ...
EDBT
2009
ACM
117views Database» more  EDBT 2009»
14 years 2 months ago
A methodology for preference-based personalization of contextual data
The widespread use of mobile appliances, with limitations in terms of storage, power, and connectivity capability, requires to minimize the amount of data to be loaded on user’s...
Antonio Miele, Elisa Quintarelli, Letizia Tanca
GIS
2007
ACM
15 years 1 days ago
Partition-based lazy updates for continuous queries over moving objects
Continuous spatial queries posted within an environment of moving objects produce as their results a time-varying set of objects. In the most ambitious case both queries and data ...
Yu-Ling Hsueh, Roger Zimmermann, Haojun Wang, Wei-...
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 6 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...