Sciweavers

211 search results - page 19 / 43
» Privacy Protected Query Processing on Spatial Networks
Sort
View
TKDE
2011
168views more  TKDE 2011»
13 years 4 months ago
On Computing Farthest Dominated Locations
—In reality, spatial objects (e.g., hotels) not only have spatial locations but also have quality attributes (e.g., price, star). An object p is said to dominate another one p , ...
Hua Lu, Man Lung Yiu
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 11 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
GIS
2004
ACM
14 years 10 months ago
Supporting spatial aggregation in sensor network databases
Sensor networks are unattended deeply distributed systems whose schema can be conceptualized using the relational model. Aggregation queries on the data sampled at each ode are th...
Mehdi Sharifzadeh, Cyrus Shahabi
CSE
2009
IEEE
14 years 3 months ago
Privacy Requirements in Vehicular Communication Systems
Abstract—A primary goal of vehicular communication systems is the enhancement of traffic safety by equipping vehicles with wireless communication units to facilitate cooperative...
Florian Schaub, Zhendong Ma, Frank Kargl
AINA
2010
IEEE
14 years 2 months ago
GEPETO: A GEoPrivacy-Enhancing TOolkit
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
Sébastien Gambs, Marc-Olivier Killijian, Mi...