We consider trails to be a document type of growing importance, authored in abundance as locative technologies become embedded in mobile devices carried by billions of humans. As ...
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
—A central challenge facing sensor network research and development is the difficulty in providing effective autonomous management capability. This is due to a large number of p...
Antonio G. Ruzzelli, Conor Muldoon, Anthony Schoof...
This paper studies a heterogeneous multiple channel environment (HMCE), in which the channels are controlled by different wireless operators. To the best of our knowledge, there i...
Because of the large amount of trajectory data produced by mobile devices, there is an increasing need for mechanisms to extract knowledge from this data. Most existing works have...