Sciweavers

1588 search results - page 250 / 318
» Wireless personal area networks
Sort
View
MOBISYS
2003
ACM
14 years 8 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
PERCOM
2007
ACM
14 years 3 months ago
Sensor Web Design Studies for Realtime Dynamic Congestion Pricing
Traffic Congestion is a multi-billion dollar national problem and worsening every year with population growth and increase in freight traffic. We present a model for realistic s...
Milton Halem, Anand Patwardhan, Sandor Dornbush, M...
ICCCN
2008
IEEE
14 years 3 months ago
Fingerprint-Based Location Estimation with Virtual Access Points
— Location fingerprinting techniques generally make use of existing wireless network infrastructure. Consequently, the positions of the access points (APs), which constitute an ...
A. K. M. Mahtab Hossain, Hien Nguyen Van, Wee-Seng...
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 9 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
MOBIHOC
2009
ACM
14 years 4 months ago
Revenue generation for truthful spectrum auction in dynamic spectrum access
Spectrum is a critical yet scarce resource and it has been shown that dynamic spectrum access can significantly improve spectrum utilization. To achieve this, it is important to ...
Juncheng Jia, Qian Zhang, Qin Zhang, Mingyan Liu