Sciweavers

2347 search results - page 37 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
ISBI
2004
IEEE
14 years 9 months ago
Automated Interpretation of Subcellular Location Patterns
Fluorescence microscopy is widely used to analyze the distribution of proteins within cells. As currently practiced, the assignment of a protein to a particular organelle is done ...
Robert F. Murphy
PERVASIVE
2005
Springer
14 years 2 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
STOC
2005
ACM
174views Algorithms» more  STOC 2005»
14 years 9 months ago
On the average case performance of some greedy approximation algorithms for the uncapacitated facility location problem
In combinatorial optimization, a popular approach to NP-hard problems is the design of approximation algorithms. These algorithms typically run in polynomial time and are guarante...
Abraham Flaxman, Alan M. Frieze, Juan Carlos Vera
ICDE
2010
IEEE
359views Database» more  ICDE 2010»
14 years 8 months ago
Policy-Aware Sender Anonymity in Location Based Services
Sender anonymity in location-based services (LBS) attempts to hide the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. &...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
MOBIHOC
2001
ACM
14 years 8 months ago
Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure
The development of practical, localized algorithms is probably the most needed and most challenging task in wireless ad-hoc sensor networks (WASNs). Localized algorithms are a spe...
Seapahn Meguerdichian, Sasha Slijepcevic, Vahag Ka...