Sciweavers

947 search results - page 155 / 190
» Information Security in Mobile Databases
Sort
View
GIS
2010
ACM
13 years 9 months ago
Automatic construction and multi-level visualization of semantic trajectories
With the prevalence of GPS-embedded mobile devices, enormous amounts of mobility data are being collected in the form of trajectory - a stream of (x,y,t) points. Such trajectories...
Zhixian Yan, Lazar Spremic, Dipanjan Chakraborty, ...
CLEF
2010
Springer
14 years 1 days ago
Visual Localization Using Global Visual Features and Vanishing Points
Abstract. This paper describes a visual localization approach for mobile robots. Robot localization is performed as location recognition. The approach uses global visual features (...
Olivier Saurer, Friedrich Fraundorfer, Marc Pollef...
MOBISYS
2007
ACM
14 years 10 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
SIGUCCS
2004
ACM
14 years 4 months ago
Web-based technologies: reaching their ultimate potential on restricted budgets
Academic institutions’ dependence on web-based technologies to improve efficiency in class offerings, academic records, and office documentation is increasing at a rapid pace. T...
Salvador Báez-Franceschi, Karen Le, Diana V...
KES
2008
Springer
13 years 9 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail