One characteristic of the next generation wireless mobile environments is a high level of interoperability between mobile applications and services. This imposes significant dema...
Simulated, false location reports can be an effective way to confuse a privacy attacker. When a mobile user must transmit his or her location to a central server, these location re...
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
In Autonomic Computing, an application needs to be aware of its environment. While the term "environment" is not normally understood as being a physical environment, in ...
The Cervical Cancer gene DataBase (CCDB, http:// crdd.osdd.net/raghava/ccdb) is a manually curated catalog of experimentally validated genes that are thought, or are known to be i...
Subhash M. Agarwal, Dhwani Raghav, Harinder Singh,...