Sciweavers

1037 search results - page 153 / 208
» Distributed Database Design for Mobile Geographical Applicat...
Sort
View
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
16 years 3 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
MOBISYS
2009
ACM
16 years 2 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
16 years 1 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
BIRTHDAY
2003
Springer
15 years 6 months ago
Spatial Data Management for Virtual Product Development
Abstract: In the automotive and aerospace industry, millions of technical documents are generated during the development of complex engineering products. Particularly, the universa...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
WWW
2003
ACM
16 years 2 months ago
The XML web: a first study
Although originally designed for large-scale electronic publishing, XML plays an increasingly important role in the exchange of data on the Web. In fact, it is expected that XML w...
Laurent Mignet, Denilson Barbosa, Pierangelo Veltr...