Sciweavers

1092 search results - page 9 / 219
» Located Operators
Sort
View
SIS
2008
13 years 11 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
NDSS
2008
IEEE
14 years 4 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
ER
2008
Springer
91views Database» more  ER 2008»
13 years 11 months ago
Location-Based Software Modeling and Analysis: Tropos-Based Approach
The continuous growth of interest in mobile applications makes the concept of location essential to design and develop software systems. Location-based software is supposed to be a...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
IPPS
2006
IEEE
14 years 3 months ago
Coordinate transformation - a solution for the privacy problem of location based services?
Protecting location information of mobile users in Location Based Services (LBS) is a very important but quite difficult and still largely unsolved problem. Location information h...
Andreas Gutscher
INFOCOM
2000
IEEE
14 years 2 months ago
RADAR: An In-Building RF-Based User Location and Tracking System
The proliferation of mobile computing devices and local-area wireless networks has fostered a growing interest in location-aware systems and services. In this paper we present RAD...
Paramvir Bahl, Venkata N. Padmanabhan