Sciweavers

345 search results - page 1 / 69
» Providing K-Anonymity in location based services
Sort
View
PERCOM
2009
ACM
13 years 10 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
TMC
2008
159views more  TMC 2008»
13 years 2 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
NDT
2010
13 years 2 months ago
Integration of Similar Location Based Services Proposed by Several Providers
Due to the fact that mobile devices are in widespread use, many applications including Location Based Services (LBS) had been involved to deliver relevant information to customers...
Roula Karam, Franck Favetta, Rima Kilany, Robert L...
SIGKDD
2010
159views more  SIGKDD 2010»
13 years 2 months ago
Providing K-Anonymity in location based services
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution appr...
Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S....
MICRO
2010
IEEE
121views Hardware» more  MICRO 2010»
13 years 1 months ago
Probabilistic Distance-Based Arbitration: Providing Equality of Service for Many-Core CMPs
Abstract--Emerging many-core chip multiprocessors will integrate dozens of small processing cores with an on-chip interconnect consisting of point-to-point links. The interconnect ...
Michael M. Lee, John Kim, Dennis Abts, Michael R. ...