— The telecom and the internet world is converging towards all-IP network architecture and the operators are keen to provide innovative multimedia services coupled with advanced ...
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
This paper presents a framework for personal agents that respect the privacy of the individual. We present some motivations and outline a framework for the use of personal agents a...
Ian Dickinson, Dave Reynolds, Dave Banks, Steve Ca...
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design proces...
Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, M....