Sciweavers

771 search results - page 149 / 155
» Wireless Network Information Flow: A Deterministic Approach
Sort
View
PERCOM
2009
ACM
14 years 2 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
PET
2010
Springer
13 years 9 months ago
Achieving Efficient Query Privacy for Location Based Services
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations...
Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg,...
AVI
2006
13 years 9 months ago
Mobility agents: guiding and tracking public transportation users
Increasingly, public transportation systems are equipped with Global Positioning Systems (GPS) connected to control centers through wireless networks. Controllers use this infrast...
Alexander Repenning, Andri Ioannidou
MOBIDE
1999
ACM
14 years 5 days ago
Pervasive Computing: What is it Good for?
The first mass-produced pervasive computing devices are starting to appear—the AutoPC, the Internet-connected ScreenFridge, and the combination Microwave Oven/Home Banking term...
Andrew C. Huang, Benjamin C. Ling, Shankar Ponneka...
PERVASIVE
2006
Springer
13 years 7 months ago
Collaborative Localization: Enhancing WiFi-Based Position Estimation with Neighborhood Links in Clusters
Abstract. Location-aware services can benefit from accurate and reliable indoor location tracking. The widespread adoption of 802.11x wireless LAN as the network infrastructure cre...
Li-Wei Chan, Ji-Rung Chiang, Yi-Chao Chen, Chia-na...