-
1
-
-
77953812953
-
-
TIER
-
TIER, http://tier.cs.berkeley.edu/wiki/home, 2010.
-
(2010)
-
-
-
2
-
-
77953812788
-
-
Chronology of Data Breaches
-
Chronology of Data Breaches, http://www.privacyrights.org/ar/ chrondatabreaches.htm, 2010.
-
(2010)
-
-
-
3
-
-
77953812276
-
-
Urban Atmospheres
-
Urban Atmospheres, http://www.urban-atmospheres.net, 2010.
-
(2010)
-
-
-
4
-
-
77953810669
-
-
Path Intelligence
-
Path Intelligence, http://www.pathintelligence.com, 2010
-
(2010)
-
-
-
5
-
-
77953808126
-
-
INRIX
-
INRIX, http://www.inrix.com, 2006
-
(2006)
-
-
-
6
-
-
77953811969
-
-
Intellione
-
Intellione, http://www.intellione.com, 2006.
-
(2006)
-
-
-
7
-
-
77953807108
-
-
Participatory Urbanism
-
Participatory Urbanism, http://www.urban-atmospheres.net/ ParticipatoryUrbanism/index.html, 2008.
-
(2008)
-
-
-
8
-
-
0041783510
-
Privacy-preserving data mining
-
May
-
R. Agrawal and R. Srikant, "Privacy-Preserving Data Mining," Proc. ACM SIGMOD, pp. 439-450, May 2000.
-
(2000)
Proc. ACM SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
9
-
-
51249098595
-
VoxNet: An interactive, rapidly-deployable acoustic monitoring platform
-
M. Allen, L. Girod, R. Newton, S. Madden, D.T. Blumstein, and D. Estrin, "VoxNet: An Interactive, Rapidly-Deployable Acoustic Monitoring Platform," Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '08), pp. 371-382, 2008.
-
(2008)
Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '08)
, pp. 371-382
-
-
Allen, M.1
Girod, L.2
Newton, R.3
Madden, S.4
Blumstein, D.T.5
Estrin, D.6
-
12
-
-
85020160358
-
Anonymity in location-based services: Towards a general framework
-
C. Bettini, S. Mascetti, X.S. Wang, and S. Jajodia, "Anonymity in Location-Based Services: Towards a General Framework," Proc. Int'l Conf. Mobile Data Management (MDM '08), pp. 69-76, 2007.
-
(2007)
Proc. Int'l Conf. Mobile Data Management (MDM '08)
, pp. 69-76
-
-
Bettini, C.1
Mascetti, S.2
Wang, X.S.3
Jajodia, S.4
-
13
-
-
78049524523
-
Operational parameters affecting use of anonymous cell phone tracking for generating traffic information
-
Jan.
-
R. Cayford and T. Johnson, "Operational Parameters Affecting Use of Anonymous Cell Phone Tracking for Generating Traffic Information," Proc. Inst. Transportation Studies for the 82nd TRB Ann. Meeting, vol.1, no.3, pp. 03-3865, Jan. 2003.
-
(2003)
Proc. Inst. Transportation Studies for the 82nd TRB Ann. Meeting
, vol.1
, Issue.3
, pp. 03-3865
-
-
Cayford, R.1
Johnson, T.2
-
14
-
-
0019532104
-
Untraceable electronic, mail return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable Electronic, Mail Return Addresses, and Digital Pseudonyms," Comm. ACM, vol.24, no.2, pp. 84-90, 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
16
-
-
2942654159
-
The platform for privacy preferences 1.0 (P3p1.0) specification
-
Apr.
-
L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle, "The Platform for Privacy Preferences 1.0 (P3P1.0) Specification," W3C Recommendation, Apr. 2002.
-
(2002)
W3C Recommendation
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Reagle, J.4
-
17
-
-
84953743484
-
A simulation evaluation of a real-time traffic information system using probe vehicles
-
X. Dai, M. Ferman, and R. Roesser, "A Simulation Evaluation of a Real-Time Traffic Information System Using Probe Vehicles," Proc. IEEE Int'l Conf. Intelligent Transportation Systems, pp. 475-480, 2003.
-
(2003)
Proc. IEEE Int'l Conf. Intelligent Transportation Systems
, pp. 475-480
-
-
Dai, X.1
Ferman, M.2
Roesser, R.3
-
23
-
-
85127507791
-
Virtual trip lines for distributed privacy-preserving traffic monitoring
-
B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.-C. Herrera, A. Bayen, M. Annavaram, and Q. Jacobson, "Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring," Proc. ACM Int'l Conf. Mobile Systems, Applications and Services (MobiSys '08), 2008.
-
(2008)
Proc. ACM Int'l Conf. Mobile Systems, Applications and Services (MobiSys '08)
-
-
Hoh, B.1
Gruteser, M.2
Herring, R.3
Ban, J.4
Work, D.5
Herrera, J.-C.6
Bayen, A.7
Annavaram, M.8
Jacobson, Q.9
-
24
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
Oct.
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing Security and Privacy in Traffic-Monitoring Systems," IEEE Pervasive Computing, vol.5, no.4, pp. 38-46, Oct. 2006.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
25
-
-
57349108972
-
Preserving privacy in GPS traces via uncertainty-aware path cloaking
-
Oct.
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking," Proc. ACM Conf. Computer and Comm. Security (CCS '07), Oct. 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security (CCS '07)
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
26
-
-
34247356882
-
CarTel: A distributed mobile sensor computing system
-
Nov.
-
B. Hull, V. Bychkovsky, Y. Zhang, K. Chen, M. Goraczko, A.K. Miu, E. Shih, H. Balakrishnan, and S. Madden, "CarTel: A Distributed Mobile Sensor Computing System," Proc. Fourth ACM Conf. Embedded Networked Sensor Systems (SenSys '06), Nov. 2006.
-
(2006)
Proc. Fourth ACM Conf. Embedded Networked Sensor Systems (SenSys '06)
-
-
Hull, B.1
Bychkovsky, V.2
Zhang, Y.3
Chen, K.4
Goraczko, M.5
Miu, A.K.6
Shih, E.7
Balakrishnan, H.8
Madden, S.9
-
27
-
-
35449007284
-
Preserving location privacy in wireless LANs
-
T. Jiang, H. Wang, and Y.-C. Hu, "Preserving Location Privacy in Wireless LANs," Proc. Fifth ACM Int'l Conf. Mobile Systems, Applications and Services (MobiSys '07), 2007.
-
(2007)
Proc. Fifth ACM Int'l Conf. Mobile Systems, Applications and Services (MobiSys '07)
-
-
Jiang, T.1
Wang, H.2
Hu, Y.-C.3
-
28
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
Dec.
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Trans. Knowledge and Data Eng., vol.19, no.12, pp. 1719-1733, Dec. 2007.
-
(2007)
IEEE Trans. Knowledge and Data Eng.
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
29
-
-
70349329219
-
AnonySense: Opportunistic and privacy-preserving context collection
-
May
-
A. Kapadia, N. Triandopoulos, C. Cornelius, D. Peebles, and D. Kotz, "AnonySense: Opportunistic and Privacy-Preserving Context Collection," Proc. Sixth Int'l Conf. Pervasive Computing (Pervasive '08), May 2008.
-
(2008)
Proc. Sixth Int'l Conf. Pervasive Computing (Pervasive '08)
-
-
Kapadia, A.1
Triandopoulos, N.2
Cornelius, C.3
Peebles, D.4
Kotz, D.5
-
30
-
-
33847291321
-
Random data perturbation techniques and privacy preserving data mining
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "Random Data Perturbation Techniques and Privacy Preserving Data Mining," Proc. IEEE Int'l Conf. Data Mining (ICDM '03), 2003.
-
(2003)
Proc. IEEE Int'l Conf. Data Mining (ICDM '03)
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
31
-
-
51249111595
-
Toward community sensing
-
Apr.
-
A. Krause, E. Horvitz, A. Kansal, and F. Zhao, "Toward Community Sensing," Proc. ACM/IEEE Int'l Conf. Information Processing in Sensor Networks (IPSN '08), Apr. 2008.
-
(2008)
Proc. ACM/IEEE Int'l Conf. Information Processing in Sensor Networks (IPSN '08)
-
-
Krause, A.1
Horvitz, E.2
Kansal, A.3
Zhao, F.4
-
33
-
-
84885223558
-
Swing & swap: User-centric approaches towards maximizing location privacy
-
M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, "Swing & Swap: User-Centric Approaches Towards Maximizing Location Privacy," Proc. Fifth ACM Workshop Privacy in the Electronic Soc. (WPES '06), pp. 19-28, 2006.
-
(2006)
Proc. Fifth ACM Workshop Privacy in the Electronic Soc. (WPES '06)
, pp. 19-28
-
-
Li, M.1
Sampigethaya, K.2
Huang, L.3
Poovendran, R.4
-
34
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
M.F. Mokbel, C.-Y. Chow, and W.G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy," Proc. 32nd Int'l Conf. Very Large Data Bases (VLDB '06), VLDB Endowment, pp. 763-774, 2006.
-
(2006)
Proc. 32nd Int'l Conf. Very Large Data Bases (VLDB '06), VLDB Endowment
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
36
-
-
4344559647
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
P. Samarati and L. Sweeney, "Protecting Privacy When Disclosing Information: K-Anonymity and Its Enforcement through Generalization and Suppression," Proc. IEEE Symp. Research in Security and Privacy, 1998.
-
(1998)
Proc. IEEE Symp. Research in Security and Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
39
-
-
33745836765
-
Putting people in their place: An anonymous and privacy-sensitive approach to collecting sensed data in location-based applications
-
K.P. Tang, P. Keyani, J. Fogarty, and J.I. Hong, "Putting People in Their Place: An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications," Proc. Conf. Human Factors in Computing Systems, pp. 93-102, 2006.
-
(2006)
Proc. Conf. Human Factors in Computing Systems
, pp. 93-102
-
-
Tang, K.P.1
Keyani, P.2
Fogarty, J.3
Hong, J.I.4
-
41
-
-
51349083760
-
Exploring historical location data for anonymity preservation in location-based services
-
T. Xu and Y. Cai, "Exploring Historical Location Data for Anonymity Preservation in Location-Based Services," Proc. IEEE INFOCOM, pp. 547-555, 2008.
-
(2008)
Proc. IEEE INFOCOM
, pp. 547-555
-
-
Xu, T.1
Cai, Y.2
-
42
-
-
35448975200
-
Surface street traffic estimation
-
J. Yoon, B. Noble, and M. Liu, "Surface Street Traffic Estimation," Proc. Fifth Int'l Conf. Mobile Systems, Applications and Services (MobiSys '07), pp. 220-232, 2007.
-
(2007)
Proc. Fifth Int'l Conf. Mobile Systems, Applications and Services (MobiSys '07)
, pp. 220-232
-
-
Yoon, J.1
Noble, B.2
Liu, M.3
-
43
-
-
33644587121
-
Preserving mobile customer privacy: An access control system for moving objects and customer profiles
-
M. Youssef, V. Atluri, and N.R. Adam, "Preserving Mobile Customer Privacy: An Access Control System for Moving Objects and Customer Profiles," Proc. Sixth Int'l Conf. Mobile Data Management (MDM '05), pp. 67-76, 2005.
-
(2005)
Proc. Sixth Int'l Conf. Mobile Data Management (MDM '05)
, pp. 67-76
-
-
Youssef, M.1
Atluri, V.2
Adam, N.R.3
|