Sciweavers

1092 search results - page 9 / 219
» Located Operators
Sort
View
SIS
2008
15 years 1 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
NDSS
2008
IEEE
15 years 6 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
ER
2008
Springer
91views Database» more  ER 2008»
15 years 1 months ago
Location-Based Software Modeling and Analysis: Tropos-Based Approach
The continuous growth of interest in mobile applications makes the concept of location essential to design and develop software systems. Location-based software is supposed to be a...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
85
Voted
IPPS
2006
IEEE
15 years 5 months ago
Coordinate transformation - a solution for the privacy problem of location based services?
Protecting location information of mobile users in Location Based Services (LBS) is a very important but quite difficult and still largely unsolved problem. Location information h...
Andreas Gutscher
INFOCOM
2000
IEEE
15 years 4 months ago
RADAR: An In-Building RF-Based User Location and Tracking System
The proliferation of mobile computing devices and local-area wireless networks has fostered a growing interest in location-aware systems and services. In this paper we present RAD...
Paramvir Bahl, Venkata N. Padmanabhan