The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
A global Internet overlay testbed is being deployed to support the distributed, shared use of resources for network research. The Global X-Bone (GX-Bone) augments the X-Bone softw...
Joseph D. Touch, Yu-Shun Wang, Venkata K. Pingali,...
Modern developments in the use of information technology within command and control allow unprecedented degrees of flexibility in the way teams deal with tasks. These developments...
Robert J. Houghton, Chris Baber, Malcolm Cowton, G...
This paper deals with preference representation and elicitation in the context of multiattribute utility theory under risk. Assuming the decision maker behaves according to the EU...
Abstract. Environmental scientists frequently engage in "campaignstyle" deployments, where they visit a location for a relatively short period of time (several weeks to m...
Douglas Carlson, Jayant Gupchup, Rob Fatland, Andr...