Sciweavers

680 search results - page 31 / 136
» Locating Hidden Servers
Sort
View
IMC
2009
ACM
14 years 4 months ago
Where's that phone?: geolocating IP addresses on 3G networks
Cell phones connected to high-speed 3G networks constitute an increasingly important class of clients on the Internet. From the viewpoint of the servers they connect to, such devi...
Mahesh Balakrishnan, Iqbal Mohomed, Venugopalan Ra...
SRDS
2003
IEEE
14 years 3 months ago
Preventing Orphan Requests in the Context of Replicated Invocation
In today’s systems, applications are composed from various components that may be located on different machines. The components (acting as servers) may have to collaborate in or...
Stefan Pleisch, Arnas Kupsys, André Schiper
DEXA
2007
Springer
173views Database» more  DEXA 2007»
14 years 4 months ago
A P2P Technique for Continuous k-Nearest-Neighbor Query in Road Networks
Due to the high frequency in location updates and the expensive cost of continuous query processing, server computation capacity and wireless communication bandwidth are the two li...
Fuyu Liu, Kien A. Hua, Tai T. Do
TMC
2008
159views more  TMC 2008»
13 years 8 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
TMC
2011
1105views more  TMC 2011»
13 years 5 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He