190
Voted
MDM
15 years 6 months ago
2010 Springer
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
123
click to vote
MDM
15 years 3 months ago
2010 Springer
A k-Range Nearest Neighbor (or kRNN for short) query in road networks finds the k nearest neighbors of every point on the road segments within a given query region based on the net...
112
click to vote
MDM
15 years 3 months ago
2010 Springer
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
136
click to vote
MDM
14 years 12 months ago
2010 Springer
— We introduce a novel strategy for data processing in Wireless Sensor Networks (WSNs) in the case of emergency fire evacuation with stringent delay constraints. Such networks sh...
115
click to vote
MDM
15 years 6 months ago
2010 Springer
—Matching a raw GPS trajectory to roads on a digital map is often referred to as the Map Matching problem. However, the occurrence of the low-sampling-rate trajectories (e.g. one...
|