-
1
-
-
34147120474
-
A Note on two Problems in Connexion with Graphs,
-
E. W. Dijkstra, "A Note on two Problems in Connexion with Graphs, " in Numerische Mathematik, 1959, pp. 269-271.
-
(1959)
Numerische Mathematik
, pp. 269-271
-
-
Dijkstra, E.W.1
-
2
-
-
0022094206
-
Generalized Best-First Search Strategies and the Optimality of A*
-
R. Dechter and J. Pearl, "Generalized Best-First Search Strategies and the Optimality of A*, " Journal of ACM, vol. 32, no. 3, pp. 505-536, 1985.
-
(1985)
Journal of ACM
, vol.32
, Issue.3
, pp. 505-536
-
-
Dechter, R.1
Pearl, J.2
-
3
-
-
4544259863
-
An Architecture for Privacy-Sensitive Ubiquitous Computing,
-
J. I. Hong and J. A. Landay, "An Architecture for Privacy-Sensitive Ubiquitous Computing, " in Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, 2002, pp. 177- 189.
-
(2002)
Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
4
-
-
52649118020
-
-
M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services, in Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, Cancun, Mexico, Apr 7-12, 2008, pp. 366-375.
-
M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, "Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services, " in Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, Cancun, Mexico, Apr 7-12, 2008, pp. 366-375.
-
-
-
-
5
-
-
85018204196
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking,
-
San Francisco, CA, USA
-
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, " in Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA, USA, 2003.
-
(2003)
Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services (MobiSys 2003)
-
-
Gruteser, M.1
Grunwald, D.2
-
6
-
-
35648982949
-
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries, " IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719-1733, 2007.
-
(2007)
IEEE Trans. Knowl. Data Eng
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
7
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy,
-
Seoul, Korea, Sep 12-15
-
M. F. Mokbel, C.-Y. Chow, and W. G. Aref, "The new casper: Query processing for location services without compromising privacy, " in Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), Seoul, Korea, Sep 12-15, 2006, pp. 763-774.
-
(2006)
Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB)
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
8
-
-
24944432404
-
A Formal Model of Obfuscation and Negotiation for Location Privacy,
-
Munich, Germany, May 8-13
-
M. Duckham and L. Kulik, "A Formal Model of Obfuscation and Negotiation for Location Privacy, " in Proceedings of Third International Conference on Pervasive Computing (PERVASIVE), Munich, Germany, May 8-13, 2005, pp. 152-170.
-
(2005)
Proceedings of Third International Conference on Pervasive Computing (PERVASIVE)
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
9
-
-
0030734554
-
CCAM: A Connectivity-Clustered Access Method for Networks and Network Computations
-
S. Shekhar and D.-R. Liu, "CCAM: A Connectivity-Clustered Access Method for Networks and Network Computations, " IEEE Transactions on Knowledge and Data Engineering, vol. 9, no. 1, pp. 102-119, 1997.
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.1
, pp. 102-119
-
-
Shekhar, S.1
Liu, D.-R.2
-
10
-
-
36549043405
-
Protecting location privacy with personalized kanonymity: Architecture and algorithms
-
B. Gedik and L. Liu, "Protecting location privacy with personalized kanonymity: Architecture and algorithms, " IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
11
-
-
19544382231
-
-
U.S. Census Bureau
-
U.S. Census Bureau, "Tiger/Line. "
-
Tiger/Line
-
-
|