Sciweavers

248 search results - page 47 / 50
» Introduction to Mobile Information Retrieval
Sort
View
JSAC
2007
93views more  JSAC 2007»
13 years 9 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
GIS
2009
ACM
14 years 11 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
HRI
2010
ACM
13 years 8 months ago
Robots asking for directions: the willingness of passers-by to support robots
—This paper reports about a human-robot interaction field trial conducted with the autonomous mobile robot ACE (Autonomous City Explorer) in a public place, where the ACE robot ...
Astrid Weiss, Judith Igelsböck, Manfred Tsche...
MOBISYS
2011
ACM
13 years 19 days ago
TagSense: a smartphone-based approach to automatic image tagging
Mobile phones are becoming the convergent platform for personal sensing, computing, and communication. This paper attempts to exploit this convergence towards the problem of autom...
Chuan Qin, Xuan Bao, Romit Roy Choudhury, Srihari ...
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 10 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...