Sciweavers

174 search results - page 23 / 35
» Anonymous Mobility Management for Third Generation Mobile Ne...
Sort
View
CORR
2007
Springer
138views Education» more  CORR 2007»
14 years 11 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
GIS
2009
ACM
16 years 25 days ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
INFOCOM
1996
IEEE
15 years 3 months ago
Intelligent Agents: An Emerging Technology for Next Generation Telecommunications?
The telecommunications environment is changing its face towards an open market of information services where the vision is "information any time, at any place, in any form&qu...
Thomas Magedanz, Kurt Rothermel, Sven Krause
SUTC
2008
IEEE
15 years 6 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
CAISE
2003
Springer
15 years 5 months ago
A Portal for Ubiquitous Collaboration
This paper presents a software framework, called Collaborator, to provide a shared work-space supporting the activities of virtual teams. This system exploits seamless integration ...
Federico Bergenti, Socrates Costicoglou, Agostino ...