Sciweavers

345 search results - page 44 / 69
» Providing K-Anonymity in location based services
Sort
View
CN
2002
161views more  CN 2002»
13 years 8 months ago
Building multicast services from unicast forwarding and ephemeral state
We present an approach to building multicast services at the network layer using unicast forwarding and two additional building blocks: (i) ephemeral state probes, i.e. extremely l...
Su Wen, Jim Griffioen, Kenneth L. Calvert
ADHOCNOW
2007
Springer
14 years 2 months ago
Routing in Wireless Networks with Position Trees
Sensor networks are wireless adhoc networks where all the nodes cooperate for routing messages in the absence of a fixed infrastructure. Non-flooding, guaranteed delivery routing...
Edgar Chávez, Nathalie Mitton, Hécto...
ISCAS
2005
IEEE
130views Hardware» more  ISCAS 2005»
14 years 2 months ago
Smart bio-laboratories of the future
Abstract— Recent advances in genomic research and biotechnology have led to an increased level of technological sophistication in today’s biology laboratories. With the promisi...
See-Kiong Ng
WETICE
2002
IEEE
14 years 1 months ago
Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working
The MObile Teamwork Infrastructure for Organizations Networking (MOTION) 1 service platform that we have designed and implemented addresses an emerging requirement in the daily bu...
Pascal Fenkam, Engin Kirda, Schahram Dustdar, Hara...
JAIR
2010
143views more  JAIR 2010»
13 years 7 months ago
A Utility-Theoretic Approach to Privacy in Online Services
Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent eff...
Andreas Krause, Eric Horvitz