Sciweavers

947 search results - page 79 / 190
» Information Security in Mobile Databases
Sort
View
120
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Secure top-k query processing via untrusted location-based service providers
Abstract—This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosiv...
Rui Zhang 0007, Yanchao Zhang, Chi Zhang
146
Voted
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
15 years 7 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
CIKM
2009
Springer
15 years 10 months ago
A mobile tourist assistance and recommendation system based on complex networks
In recent years, the tourism assistance community is gradually shifting its emphasis to digital, interactive systems. Our project aims for digital tourism assistance by combining ...
Alf-Christian Schering, Martin Dueffer, Andreas Fi...
IDEAS
2003
IEEE
171views Database» more  IDEAS 2003»
15 years 9 months ago
Dynamic Data Management for Location Based Services in Mobile Environments
We characterize the dynamic data management problem for location based services(LBS) in mobile environments and devise a cost model for servicing both location independent and loc...
Shiow-yang Wu, Kun-Ta Wu
CISS
2008
IEEE
15 years 10 months ago
Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks
—We consider the design of a network in which packet transmissions between two nodes are to be guaranteed a certain probability of success. There are N independent paths between ...
Anna Kacewicz, Stephen B. Wicker