-
1
-
-
36549023667
-
-
Everyman's Library, Nov
-
G. Orwell, 1984. Everyman's Library, Nov. 1992.
-
(1992)
1984
-
-
Orwell, G.1
-
2
-
-
84858461673
-
-
Jan
-
D.W. Gage, Lifelog, http://www.darpa.mil/ipto/Programs/lifelog/, Jan. 2004.
-
(2004)
Lifelog
-
-
Gage, D.W.1
-
3
-
-
0742276510
-
-
Computer Science and Telecommunications Board, Nat'l Academics Press, Nov
-
Computer Science and Telecommunications Board, IT Roadmap to a Geospatial Future. Nat'l Academics Press, Nov. 2003.
-
(2003)
IT Roadmap to a Geospatial Future
-
-
-
4
-
-
84858454454
-
-
NextBus Inc, Jan
-
NextBus Inc., http://www.nextbus.com/, Jan. 2004.
-
(2004)
-
-
-
5
-
-
0031246031
-
CyberGuide: A Mobile Context-Aware Tour Guide
-
G. Abowd, C. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton, "CyberGuide: A Mobile Context-Aware Tour Guide," ACM Wireless Networks, vol. 3, no. 5, pp. 421-433, 1997.
-
(1997)
ACM Wireless Networks
, vol.3
, Issue.5
, pp. 421-433
-
-
Abowd, G.1
Atkeson, C.2
Hong, J.3
Long, S.4
Kooper, R.5
Pinkerton, M.6
-
6
-
-
0032050105
-
Challenges and Progress in Meeting the E-911 Requirement for Location Service
-
J. Reed, K. Krizman, B. Woerner, and T. Rappaport, "Challenges and Progress in Meeting the E-911 Requirement for Location Service," IEEE Personal Comm. Magazine, vol. 5, no. 3, pp. 30-37, 1998.
-
(1998)
IEEE Personal Comm. Magazine
, vol.5
, Issue.3
, pp. 30-37
-
-
Reed, J.1
Krizman, K.2
Woerner, B.3
Rappaport, T.4
-
7
-
-
0026483978
-
The Active Badge Location System
-
R. Want, A. Hopper, V. Falcao, and J. Gibbons, "The Active Badge Location System," ACM Trans. Information Systems, vol. 10, no. 1, pp. 91-102, 1992.
-
(1992)
ACM Trans. Information Systems
, vol.10
, Issue.1
, pp. 91-102
-
-
Want, R.1
Hopper, A.2
Falcao, V.3
Gibbons, J.4
-
9
-
-
0036992249
-
Framework for Security and Privacy in Automotive Telematics
-
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J.-M. Tang, "Framework for Security and Privacy in Automotive Telematics," Proc. Int'l Workshop Mobile Commerce, 2002.
-
(2002)
Proc. Int'l Workshop Mobile Commerce
-
-
Duri, S.1
Gruteser, M.2
Liu, X.3
Moskowitz, P.4
Perez, R.5
Singh, M.6
Tang, J.-M.7
-
10
-
-
4344559647
-
Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement through Generalization and Suppression
-
P. Samarati and L. Sweeney, "Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression," Proc. IEEE Symp. Research in Security and Privacy, 1998.
-
(1998)
Proc. IEEE Symp. Research in Security and Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
11
-
-
0035517699
-
Protecting Respondent's Privacy in Microdata Release
-
P. Samarati, "Protecting Respondent's Privacy in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, 2001.
-
(2001)
IEEE Trans. Knowledge and Data Eng
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
12
-
-
0036811662
-
k-Anonymity: A Model for Protecting Privacy
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
14
-
-
0002054934
-
Crowds: Anonymity for Web Transactions
-
M. Reiter and A.D. Rubin, "Crowds: Anonymity for Web Transactions," ACM Trans. Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Trans. Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.D.2
-
15
-
-
0005063385
-
Onion Routing for Anonymous and Private Internet Connections
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion Routing for Anonymous and Private Internet Connections," Comm. ACM, vol. 42, no. 2, pp. 9-41, 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.2
, pp. 9-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
16
-
-
1142291577
-
Evaluating Probabilistic Queries over Imprecise Data
-
R. Cheng, D.V. Kalashnikov, and S. Prabhakar, "Evaluating Probabilistic Queries over Imprecise Data," Proc. ACM Int'l Conf. Management of Data (Sigmod '03), pp. 551-562, 2003.
-
(2003)
Proc. ACM Int'l Conf. Management of Data (Sigmod '03)
, pp. 551-562
-
-
Cheng, R.1
Kalashnikov, D.V.2
Prabhakar, S.3
-
17
-
-
0025447750
-
R*-Tree: An Efficient and Robust Access Method for Points and Rectangles
-
N. Beckmann, H.-P. Kriegel, R. Schneider, and B. Seeger, "R*-Tree: An Efficient and Robust Access Method for Points and Rectangles," Proc. ACM Int'l Conf. Management of Data (Sigmod '90), pp. 322-331, 1990.
-
(1990)
Proc. ACM Int'l Conf. Management of Data (Sigmod '90)
, pp. 322-331
-
-
Beckmann, N.1
Kriegel, H.-P.2
Schneider, R.3
Seeger, B.4
-
19
-
-
77049087087
-
Anonymizing Tables
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu, "Anonymizing Tables," Proc. Int'l Conf. Database Theory (ICDT '05), pp. 246-258, 2005.
-
(2005)
Proc. Int'l Conf. Database Theory (ICDT '05)
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
20
-
-
36549054446
-
-
US Department of the Interior, Nov
-
US Department of the Interior, US Geological Survey Web Page, http://www.usgs.gov/, Nov. 2003.
-
(2003)
US Geological Survey Web Page
-
-
-
21
-
-
27944432037
-
-
Mid-Continent Mapping Center, Nov
-
Mid-Continent Mapping Center, Spatial Data Transfer Format, http://mcmcweb.er.usgs.gov/sdts/, Nov. 2003.
-
(2003)
Spatial Data Transfer Format
-
-
-
22
-
-
27944455986
-
-
SVG Working Group, Nov
-
SVG Working Group, Scalable Vector Graphics Format, http://www.w3.org/Graphics/SVG/, Nov. 2003.
-
(2003)
Scalable Vector Graphics Format
-
-
-
23
-
-
36549029560
-
-
Global Mapper Software LLC, Nov
-
Global Mapper Software LLC, Global Mapper Web Page, http://www.globalmapper.com/, Nov. 2003.
-
(2003)
Global Mapper Web Page
-
-
-
24
-
-
33646704168
-
Enter Once, Share Everywhere: User Profile Management in Converged Networks
-
A. Sahuguet, R. Hull, D.F. Lieuwen, and M. Xiong, "Enter Once, Share Everywhere: User Profile Management in Converged Networks," Proc. Biennial Conf. Innovative Data Systems Research (CIDR '03), 2003.
-
(2003)
Proc. Biennial Conf. Innovative Data Systems Research (CIDR '03)
-
-
Sahuguet, A.1
Hull, R.2
Lieuwen, D.F.3
Xiong, M.4
-
26
-
-
0018444418
-
Secure Databases: Protection against User Influence
-
D. Dobkin, A.K. Jones, and R.J. Lipton, "Secure Databases: Protection against User Influence," ACM Trans. Database Systems, vol. 4, no. 1, pp. 97-106, 1979.
-
(1979)
ACM Trans. Database Systems
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.K.2
Lipton, R.J.3
-
27
-
-
0020205885
-
Auditing and Inference Control in Statistical Databases
-
F.Y. Chin and G. Ozsoyoglu, "Auditing and Inference Control in Statistical Databases," IEEE Trans. Software Eng., vol. 8, no. 6, pp. 574-582, 1982.
-
(1982)
IEEE Trans. Software Eng
, vol.8
, Issue.6
, pp. 574-582
-
-
Chin, F.Y.1
Ozsoyoglu, G.2
-
28
-
-
0020798007
-
Information Loss in Partitioned Statistical Databases
-
J. Schlorer, "Information Loss in Partitioned Statistical Databases," Computer J., vol. 26, no. 3, pp. 218-223, 1983.
-
(1983)
Computer J
, vol.26
, Issue.3
, pp. 218-223
-
-
Schlorer, J.1
-
29
-
-
0021389555
-
Practical Data Swapping: The First Steps
-
S.P. Reiss, "Practical Data Swapping: The First Steps," ACM Trans. Database Systems, vol. 9, no. 1, pp. 20-37, 1984.
-
(1984)
ACM Trans. Database Systems
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.P.1
-
30
-
-
0021622802
-
The Statistical Security of a Statistical Database
-
J.F. Traub, Y. Yemini, and H. Wozniakowski, "The Statistical Security of a Statistical Database," ACM Trans. Database Systems, vol. 9, no. 4, pp. 672-679, 1984.
-
(1984)
ACM Trans. Database Systems
, vol.9
, Issue.4
, pp. 672-679
-
-
Traub, J.F.1
Yemini, Y.2
Wozniakowski, H.3
-
31
-
-
0019054751
-
Secure Statistical Databases with Random Sample Queries
-
D.E. Denning, "Secure Statistical Databases with Random Sample Queries," ACM Trans. Database Systems, vol. 5, no. 3, pp. 291-315, 1980.
-
(1980)
ACM Trans. Database Systems
, vol.5
, Issue.3
, pp. 291-315
-
-
Denning, D.E.1
-
32
-
-
0019056889
-
A Security Mechanism for Statistical Databases
-
L.L. Beck, "A Security Mechanism for Statistical Databases," ACM Trans. Database Systems, vol. 5, no. 3, pp. 316-338, 1980.
-
(1980)
ACM Trans. Database Systems
, vol.5
, Issue.3
, pp. 316-338
-
-
Beck, L.L.1
-
33
-
-
85065578926
-
A Privacy-Preserving Index for Range Queries
-
B. Hore, S. Mehrotra, and G. Tsudik, "A Privacy-Preserving Index for Range Queries," Proc. Int'l Conf. Very Large Data Bases (VLDB '04), pp. 720-731, 2004.
-
(2004)
Proc. Int'l Conf. Very Large Data Bases (VLDB '04)
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
|