Sciweavers

38 search results - page 5 / 8
» mdm 2007
Sort
View
MDM
2007
Springer
148views Communications» more  MDM 2007»
14 years 25 days ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen
MDM
2007
Springer
111views Communications» more  MDM 2007»
14 years 25 days ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich
MDM
2007
Springer
137views Communications» more  MDM 2007»
14 years 25 days ago
Infrastructure for Data Processing in Large-Scale Interconnected Sensor Networks
Abstract—With the price of wireless sensor technologies diminishing rapidly we can expect large numbers of autonomous sensor networks being deployed in the near future. These sen...
Karl Aberer, Manfred Hauswirth, Ali Salehi
MDM
2007
Springer
106views Communications» more  MDM 2007»
14 years 25 days ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
MDM
2007
Springer
123views Communications» more  MDM 2007»
14 years 25 days ago
On Relaxing Contextual Preference Queries
Personalization systems exploit preferences for providing users with only relevant data from the huge volume of information that is currently available. We consider preferences th...
Kostas Stefanidis, Evaggelia Pitoura, Panos Vassil...