Sciweavers

73 search results - page 10 / 15
» Trust no one: a decentralized matching service for privacy i...
Sort
View
WWW
2008
ACM
14 years 8 months ago
Matching independent global constraints for composite web services
Service discovery employs matching techniques to select services by comparing their descriptions against user constraints. Semantic-based matching approaches achieve higher recall...
Nalaka Gooneratne, Zahir Tari
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
14 years 2 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
ICMB
2007
IEEE
157views Business» more  ICMB 2007»
14 years 1 months ago
Estimating the Capacity of the Location - Based Advertising Channel
Delivering “relevant” advertisements to consumers carrying mobile devices is regarded by many as one of the most promising mobile business opportunities. The relevance of a mo...
Gyözö Gidófalvi, Hans Ravnkj&aeli...
ACSW
2003
13 years 8 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
SIGCOMM
2009
ACM
14 years 2 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...