The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The lack of available and practical analysis about some regular knowledge of mobility models has limit their applications to mobile ad hoc networks. As the mobility models have the great significance effects on the network performance, and meanwhile, existing in-depth researches are mostly based on the i.i.d. mobility model which is a way of globe move, the desire for the effective and reasonable...
A spatial monitoring query (SMQ) retrieves the set of mobile nodes that satisfy some spatial constraints, and provides real-time updates whenever this set of nodes changes. Efficient processing of such queries is essential to moving objects database management. Existing techniques rely on one or more central servers for query management and assume each mobile node can communicate with some server...
Most existing cloaking techniques only focus on achieving location k-anonymity. However, maintaining location k-anonymity alone is not enough to counter query homogeneity attacks. In this paper, we first define the query l-diversity concept in location-based services, and then propose a technique to achieve query l-diversity. The proposed technique is compared with the improved Interval Cloak technique...
The advances in wireless communication and positioning technology have made it possible to collect large volumes of personal location data. While such data are useful to many organizations, making them public accessible is generally prohibited, because location data may imply sensitive private information. This paper investigates the challenges of publishing location data while preserving the location...
A continuous k nearest neighbor (cKNN) query is a query that continuously returns a set of k nearest moving objects (mobile hosts) to a given query point. For example, report three nearest moving sensors to a given location continuously. Most existing research efforts focus on centralized solutions. In a mobile peer-to-peer network (M-P2P), a centralized approach incurs expensive communication cost...
We present a new approach for if-anonymity protection in Location-Based Services (LBSs). Specifically, we depersonalize location information by ensuring that each location reported for LBSs is a cloaking area that contains K different footprints-historical locations of different mobile nodes. Therefore, the exact identity and location of the service requestor remain anonymous from LBS service providers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.