Sciweavers

345 search results - page 62 / 69
» Providing K-Anonymity in location based services
Sort
View
IMC
2005
ACM
14 years 2 months ago
Measurements, Analysis, and Modeling of BitTorrent-like Systems
Existing studies on BitTorrent systems are single-torrent based, while more than 85% of all peers participate in multiple torrents according to our trace analysis. In addition, th...
Lei Guo, Songqing Chen, Zhen Xiao, Enhua Tan, Xiao...
EDBT
2004
ACM
163views Database» more  EDBT 2004»
14 years 8 months ago
Energy-Conserving Air Indexes for Nearest Neighbor Search
A location-based service (LBS) provides information based on the location information specified in a query. Nearest-neighbor (NN) search is an important class of queries supported ...
Baihua Zheng, Jianliang Xu, Wang-Chien Lee, Dik Lu...
MOBIHOC
2008
ACM
14 years 8 months ago
P2P-based routing and data management using the virtual cord protocol (VCP)
We present Virtual Cord Protocol (VCP), a virtual relative position based routing protocol for sensor networks that also provides methods for data management as known from standar...
Abdalkarim Awad, Reinhard German, Falko Dressler
MOBIHOC
2005
ACM
14 years 8 months ago
Timed grid routing (TIGR) bites off energy
Energy efficiency and collisions avoidance are both critical properties to increase the lifetime and effectiveness of wireless networks. This paper proposes a family of algorithms...
Roy Friedman, Guy Korland
BROADNETS
2005
IEEE
14 years 2 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang