Sciweavers

118 search results - page 24 / 24
» Design of a Middleware Service for Scalable Wide Area Networ...
Sort
View
TMC
2008
159views more  TMC 2008»
13 years 4 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
EDBT
2008
ACM
171views Database» more  EDBT 2008»
14 years 5 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
13 years 11 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer