Sciweavers

15 search results - page 1 / 3
» From Location Databases to Pervasive Catalog
Sort
View
DEXAW
2002
IEEE
118views Database» more  DEXAW 2002»
13 years 10 months ago
From Location Databases to Pervasive Catalog
One characteristic of the next generation wireless mobile environments is a high level of interoperability between mobile applications and services. This imposes significant dema...
Panos K. Chrysanthis, Vladimir Zadorozhny
PERVASIVE
2009
Springer
13 years 11 months ago
Realistic Driving Trips For Location Privacy
Simulated, false location reports can be an effective way to confuse a privacy attacker. When a mobile user must transmit his or her location to a central server, these location re...
John Krumm
VLDB
2007
ACM
295views Database» more  VLDB 2007»
13 years 11 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
DEXAW
2004
IEEE
95views Database» more  DEXAW 2004»
13 years 8 months ago
Simulation Model for Self-Adaptive Applications in Pervasive Computing
In Autonomic Computing, an application needs to be aware of its environment. While the term "environment" is not normally understood as being a physical environment, in ...
Markus C. Huebscher, Julie A. McCann
NAR
2011
340views Computer Vision» more  NAR 2011»
12 years 8 months ago
CCDB: a curated database of genes involved in cervix cancer
The Cervical Cancer gene DataBase (CCDB, http:// crdd.osdd.net/raghava/ccdb) is a manually curated catalog of experimentally validated genes that are thought, or are known to be i...
Subhash M. Agarwal, Dhwani Raghav, Harinder Singh,...