203
click to vote
MDM
15 years 8 months ago
2010 Springer
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
140
click to vote
MDM
15 years 5 months ago
2010 Springer
A k-Range Nearest Neighbor (or kRNN for short) query in road networks finds the k nearest neighbors of every point on the road segments within a given query region based on the net...
132
Voted
MDM
15 years 5 months ago
2010 Springer
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
154
click to vote
MDM
15 years 1 months ago
2010 Springer
— We introduce a novel strategy for data processing in Wireless Sensor Networks (WSNs) in the case of emergency fire evacuation with stringent delay constraints. Such networks sh...
132
click to vote
MDM
15 years 8 months ago
2010 Springer
—Matching a raw GPS trajectory to roads on a digital map is often referred to as the Map Matching problem. However, the occurrence of the low-sampling-rate trajectories (e.g. one...
|