Sciweavers

111 search results - page 8 / 23
» gis 2009
Sort
View
GIS
2009
ACM
14 years 11 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
AGILE
2009
Springer
281views GIS» more  AGILE 2009»
14 years 4 months ago
3D Wayfinding Choremes: A Cognitively Motivated Representation of Route Junctions in Virtual Environments
Research in cognitive sciences suggests that orientation and navigation along routes can be improved if the graphical representation is aligned with the user’s mental concepts o...
Tassilo Glander, Denise Peters, Matthias Trapp, J&...
COSIT
2009
Springer
125views GIS» more  COSIT 2009»
14 years 1 months ago
Merging Qualitative Constraint Networks Defined on Different Qualitative Formalisms
Abstract. This paper addresses the problem of merging qualitative constraint networks (QCNs) defined on different qualitative formalisms. Our model is restricted to formalisms wher...
Jean-François Condotta, Souhila Kaci, Pierr...
GIS
2009
ACM
14 years 1 months ago
Annotating geospatial data based on its semantics
Geospatial information (GI) constitutes a significant portion of available data and are a key factor in planning and decision-making in a variety of domains,such as emergency man...
Carla Geovana N. Macário, Sidney Roberto de...
GIS
2009
ACM
13 years 7 months ago
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
We propose a location-based query anonymization technique, LBS (k,T)-anonymization, that ensures anonymity of user's query in a specific time window against what we call know...
Amirreza Masoumzadeh, James Joshi, Hassan A. Karim...