Sciweavers

120 search results - page 9 / 24
» Location Dependent Queries in Mobile Databases
Sort
View
GIS
2009
ACM
16 years 24 days ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
JSW
2008
196views more  JSW 2008»
14 years 11 months ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih
ISCI
2002
132views more  ISCI 2002»
14 years 11 months ago
Mobile data and transaction management
Mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in ...
Sanjay Kumar Madria, Mukesh K. Mohania, Sourav S. ...
100
Voted
CIKM
2008
Springer
15 years 26 days ago
Protecting location privacy against location-dependent attack in mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. In this paper, we present location-dependent attack resulting from continuous...
Xiao Pan, Jianliang Xu, Xiaofeng Meng
DEXA
2006
Springer
137views Database» more  DEXA 2006»
15 years 3 months ago
CLEAR: An Efficient Context and Location-Based Dynamic Replication Scheme for Mobile-P2P Networks
We propose CLEAR (Context and Location-based Efficient Allocation of Replicas), a dynamic replica allocation scheme for improving data availability in mobile ad-hoc peer-to-peer (M...
Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsur...