Sciweavers

680 search results - page 54 / 136
» Locating Hidden Servers
Sort
View
142
Voted
DEBU
2010
238views more  DEBU 2010»
15 years 3 months ago
Spatio-Temporal Access Methods: Part 2 (2003 - 2010)
In spatio-temporal applications, moving objects detect their locations via location-aware devices and update their locations continuously to the server. With the ubiquity and mass...
Long-Van Nguyen-Dinh, Walid G. Aref, Mohamed F. Mo...
ICDE
2009
IEEE
409views Database» more  ICDE 2009»
17 years 3 months ago
Chameleon: Context Awareness inside DBMSs
Context is any information used to characterize the situation of an entity. Examples of contexts includetime, location, identity, and activity of a user. This paper proposes a gene...
Hicham G. Elmongui, Walid G. Aref, Mohamed F. Mokb...
130
Voted
GCC
2005
Springer
15 years 9 months ago
The Architecture and Implementation of Resource Space Model System
Resource Space Model (RSM) is a semantic model to manage and share heterogeneous resources on the Internet. This paper focuses on the general architecture, physical implementation ...
Peng Shi, Yunpeng Xing, Erlin Yao, Zhen Wang, Kehu...
144
Voted
HUC
2009
Springer
15 years 8 months ago
Privately querying location-based services with SybilQuery
To usefully query a location-based service, a mobile device must typically present its own location in its query to the server. This may not be acceptable to clients that wish to ...
Pravin Shankar, Vinod Ganapathy, Liviu Iftode
126
Voted
MOBICOM
1997
ACM
15 years 7 months ago
Composable ad-hoc Mobile Services for Universal Interaction
This paperintroduces the notion of “universalinteraction,” allowing a device to adapt its functionality to exploit services it discovers as it moves into a new environment. Us...
Todd D. Hodes, Randy H. Katz, Edouard Servan-Schre...