The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
The European Concerted Action \COMPARES" (Concerted Action on COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data) was funded within the Environment an...
Jim Austin, Giorgio Giacinto, I. Kanellopoulos, Ke...
Applications that use CORBA as communication layer often have some restrictions for multi-domain deployment. This is particularly true when they have to face firewall/NAT traversa...
Antonio Theophilo Costa, Markus Endler, Renato Cer...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...