Sciweavers

345 search results - page 31 / 69
» Providing K-Anonymity in location based services
Sort
View
EKAW
2010
Springer
13 years 8 months ago
Mobile Cultural Heritage Guide: Location-Aware Semantic Search
In this paper we explore the use of location aware mobile devices for searching and browsing a large number of general and cultural heritage information repositories. Based on GPS ...
Chris J. van Aart, Bob J. Wielinga, Willem Robert ...
IMC
2009
ACM
14 years 4 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
INFOCOM
2010
IEEE
13 years 8 months ago
Minimizing Electricity Cost: Optimization of Distributed Internet Data Centers in a Multi-Electricity-Market Environment
—The study of Cyber-Physical System (CPS) has been an active area of research. Internet Data Center (IDC) is an important emerging Cyber-Physical System. As the demand on Interne...
Lei Rao, Xue Liu, Le Xie, Wenyu Liu
ICWS
2004
IEEE
13 years 11 months ago
JClarens: A Java Based Interactive Physics Analysis Environment for Data Intensive Applications
In this paper we describe JClarens; a Java based implementation of the Clarens remote data server. JClarens provides web services for an interactive analysis environment to dynami...
Arshad Ali, Ashiq Anjum, Tahir Azim, Michael Thoma...
PERCOM
2005
ACM
14 years 9 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...