-
1
-
-
79961046640
-
-
Technical Report CMU-CyLab-10-019, CMU Cylab
-
S. Amini, J. Lindqvist, J. I. Hong, J. Lin, E. Toch, and N. Sadeh. Caché: Caching Location-Enhanced Content to Improve User Privacy [Extended]. Technical Report CMU-CyLab-10-019, CMU Cylab, 2010.
-
(2010)
Caché: Caching Location-Enhanced Content to Improve User Privacy [Extended]
-
-
Amini, S.1
Lindqvist, J.2
Hong, J.I.3
Lin, J.4
Toch, E.5
Sadeh, N.6
-
2
-
-
79961051794
-
MobiCom 2010 Poster: Caché: Caching Location-Enhanced Content to Improve User Privacy
-
S. Amini, J. Lindqvist, M. Mou, R. Raheja, J. I. Hong, J. Lin, E. Toch, and N. Sadeh. MobiCom 2010 Poster: Caché: Caching Location-Enhanced Content to Improve User Privacy. ACM MC2R, 2010.
-
(2010)
ACM MC2R
-
-
Amini, S.1
Lindqvist, J.2
Mou, M.3
Raheja, R.4
Hong, J.I.5
Lin, J.6
Toch, E.7
Sadeh, N.8
-
3
-
-
2342484676
-
Location-Based Services for Mobile Telephony: A study of user's privacy concerns
-
L. Barkhuus and A. Dey. Location-Based Services for Mobile Telephony: a study of user's privacy concerns. In Proc. of Interact, July 2003.
-
Proc. of Interact, July 2003
-
-
Barkhuus, L.1
Dey, A.2
-
5
-
-
78650014112
-
Exploring end user preferences for location obfuscation, location-based services, and the value of location
-
A. B. Brush, J. Krumm, and J. Scott. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proc. of UBICOMP, 2010.
-
Proc. of UBICOMP, 2010
-
-
Brush, A.B.1
Krumm, J.2
Scott, J.3
-
6
-
-
0041032411
-
Synchronizing a database to improve freshness
-
J. Cho and H. Garcia-Molina. Synchronizing a database to improve freshness. SIGMOD Rec., 29(2), 2000.
-
(2000)
SIGMOD Rec.
, vol.29
, Issue.2
-
-
Cho, J.1
Garcia-Molina, H.2
-
8
-
-
0002059611
-
The Bayou Architecture: Support for Data Sharing among Mobile Users
-
A. Demers, K. Petersen, M. Spreitzer, D. Terry, M. Theimer, and B. Welch. The Bayou Architecture: Support for Data Sharing Among Mobile Users. In Proc. of WMCSA, Dec. 1994.
-
Proc. of WMCSA, Dec. 1994
-
-
Demers, A.1
Petersen, K.2
Spreitzer, M.3
Terry, D.4
Theimer, M.5
Welch, B.6
-
11
-
-
79961044660
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE TMC, 2007.
-
(2007)
IEEE TMC
-
-
Gedik, B.1
Liu, L.2
-
12
-
-
85018204196
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proc. of MobiSys, 2003.
-
Proc. of MobiSys, 2003
-
-
Gruteser, M.1
Grunwald, D.2
-
15
-
-
4544243783
-
Privacy and Security in the Location-enhanced World Wide Web
-
J. Hong, G. Borriello, J. Landay, D. Mcdonald, B. Schilit, and D. Tygar. Privacy and Security in the Location-enhanced World Wide Web. In Proc. of UBICOMP, 2003.
-
Proc. of UBICOMP, 2003
-
-
Hong, J.1
Borriello, G.2
Landay, J.3
Mcdonald, D.4
Schilit, B.5
Tygar, D.6
-
16
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
J. I. Hong and J. A. Landay. An architecture for privacy-sensitive ubiquitous computing. In Proc. of MobiSys, 2004.
-
Proc. of MobiSys, 2004
-
-
Hong, J.I.1
Landay, J.A.2
-
18
-
-
85169431712
-
Dede: Design and evaluation of a context-enhanced mobile messaging system
-
Y. Jung, P. Persson, and J. Blom. Dede: design and evaluation of a context-enhanced mobile messaging system. In Proc. of CHI, 2005.
-
Proc. of CHI, 2005
-
-
Jung, Y.1
Persson, P.2
Blom, J.3
-
19
-
-
46949103941
-
Privacy Implications of Personal Locators: Why You Should Think Twice before Voluntarily Availing Yourself to GPS Monitoring
-
W. Karim. Privacy Implications of Personal Locators: Why You Should Think Twice before Voluntarily Availing Yourself to GPS Monitoring. Washington University Journal of Law and Policy, 14(485), 2004.
-
(2004)
Washington University Journal of Law and Policy
, vol.14
, Issue.485
-
-
Karim, W.1
-
22
-
-
69949147841
-
A survey of computational location privacy
-
J. Krumm. A survey of computational location privacy. Personal Ubiquitous Comput., 2008.
-
(2008)
Personal Ubiquitous Comput.
-
-
Krumm, J.1
-
23
-
-
84883261388
-
Replication is not needed: Single database, computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: single database, computationally-private information retrieval. In Proc. of FOCS, 1997.
-
Proc. of FOCS, 1997
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
24
-
-
24944559058
-
Place lab: Device positioning using radio beacons in the wild
-
A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, T. S. James Scott, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit. Place lab: Device positioning using radio beacons in the wild. In Proc. of Pervasive, 2005.
-
Proc. of Pervasive, 2005
-
-
LaMarca, A.1
Chawathe, Y.2
Consolvo, S.3
Hightower, J.4
Smith, I.5
James Scott, T.S.6
Howard, J.7
Hughes, J.8
Potter, F.9
Tabert, J.10
Powledge, P.11
Borriello, G.12
Schilit, B.13
-
26
-
-
84862096477
-
I'm the Mayor of My House: Examining Why People Use foursquare - A Social-Driven Location Sharing Application
-
J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. I'm the Mayor of My House: Examining Why People Use foursquare - a Social-Driven Location Sharing Application. In Proc. of CHI, 2011.
-
Proc. of CHI, 2011
-
-
Lindqvist, J.1
Cranshaw, J.2
Wiese, J.3
Hong, J.4
Zimmerman, J.5
-
29
-
-
34547720006
-
The new Casper: Query processing for location services without compromising privacy
-
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new Casper: query processing for location services without compromising privacy. In Proc. of VLDB, 2006.
-
Proc. of VLDB, 2006
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
31
-
-
57349141405
-
Recrawl scheduling based on information longevity
-
C. Olston and S. Pandey. Recrawl scheduling based on information longevity. In Proc. of WWW, 2008.
-
Proc. of WWW, 2008
-
-
Olston, C.1
Pandey, S.2
-
36
-
-
67650293214
-
Understanding andcapturing people's privacy policies in a mobile socialnetworking application
-
N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley,M. Prabaker, and J. Rao. Understanding andcapturing people's privacy policies in a mobile socialnetworking application. Personal Ubiquitous Comput.,13(6), 2009.
-
(2009)
Personal Ubiquitous Comput.
, vol.13
, Issue.6
-
-
Sadeh, N.1
Hong, J.2
Cranor, L.3
Fette, I.4
Kelley, P.5
Prabaker, M.6
Rao, J.7
-
37
-
-
79961059001
-
Experience withdisconnected operation in a mobile computingenvironment
-
M. Satyanarayanan, J. J. Kistler, L. B. Mummert,M. R. Ebling, P. Kumar, and Q. Lu. Experience withdisconnected operation in a mobile computingenvironment. In Proc. of MLCS, 1993.
-
Proc. of MLCS, 1993
-
-
Satyanarayanan, M.1
Kistler, J.J.2
Mummert, L.B.3
Ebling, M.R.4
Kumar, P.5
Lu, Q.6
-
39
-
-
83355168199
-
Unraveling an old cloak: K-anonymityfor location privacy
-
R. Shokri, C. Troncoso, C. Diaz, J. Freudiger, andJ.-P. Hubaux. Unraveling an old cloak: k-anonymityfor location privacy. In Proc. of WPES, 2010.
-
Proc. of WPES, 2010
-
-
Shokri, R.1
Troncoso, C.2
Diaz, C.3
Freudiger, J.4
Hubaux, J.-P.5
-
41
-
-
79961042516
-
Broadband Reality Check: The FCCignores America's Digital Divide
-
D. Turner. Broadband Reality Check: The FCCignores America's Digital Divide. Consumer Union,2005.
-
(2005)
Consumer Union
-
-
Turner, D.1
-
42
-
-
79961096201
-
Location Based Servicesfor Mobiles: Technologies and Standards
-
S. Wang, J. Min, and B. Yi. Location Based Servicesfor Mobiles: Technologies and Standards. In Proc. ofICC, 2008.
-
Proc. OfICC, 2008
-
-
Wang, S.1
Min, J.2
Yi, B.3
-
43
-
-
77953055403
-
Optimal crawling strategies for websearch engines
-
J. L. Wolf, M. S. Squillante, P. S. Yu, J. Sethuraman,and L. Ozsen. Optimal crawling strategies for websearch engines. In Proc. of WWW, 2002.
-
Proc. of WWW, 2002
-
-
Wolf, J.L.1
Squillante, M.S.2
Yu, P.S.3
Sethuraman, J.4
Ozsen, L.5
|